mirror of
https://github.com/gyurix1968/guacamole-client.git
synced 2025-09-07 13:41:21 +00:00
Merge pull request #121 from glyptodon/active-connection-directory
GUAC-1132: Implement active connection directory.
This commit is contained in:
@@ -57,6 +57,11 @@ import org.glyptodon.guacamole.auth.jdbc.permission.ConnectionPermissionSet;
|
|||||||
import org.glyptodon.guacamole.auth.jdbc.permission.UserPermissionMapper;
|
import org.glyptodon.guacamole.auth.jdbc.permission.UserPermissionMapper;
|
||||||
import org.glyptodon.guacamole.auth.jdbc.permission.UserPermissionService;
|
import org.glyptodon.guacamole.auth.jdbc.permission.UserPermissionService;
|
||||||
import org.glyptodon.guacamole.auth.jdbc.permission.UserPermissionSet;
|
import org.glyptodon.guacamole.auth.jdbc.permission.UserPermissionSet;
|
||||||
|
import org.glyptodon.guacamole.auth.jdbc.activeconnection.ActiveConnectionDirectory;
|
||||||
|
import org.glyptodon.guacamole.auth.jdbc.activeconnection.ActiveConnectionPermissionService;
|
||||||
|
import org.glyptodon.guacamole.auth.jdbc.activeconnection.ActiveConnectionPermissionSet;
|
||||||
|
import org.glyptodon.guacamole.auth.jdbc.activeconnection.ActiveConnectionService;
|
||||||
|
import org.glyptodon.guacamole.auth.jdbc.activeconnection.TrackedActiveConnection;
|
||||||
import org.glyptodon.guacamole.environment.Environment;
|
import org.glyptodon.guacamole.environment.Environment;
|
||||||
import org.mybatis.guice.MyBatisModule;
|
import org.mybatis.guice.MyBatisModule;
|
||||||
import org.mybatis.guice.datasource.builtin.PooledDataSourceProvider;
|
import org.mybatis.guice.datasource.builtin.PooledDataSourceProvider;
|
||||||
@@ -120,6 +125,8 @@ public class JDBCAuthenticationProviderModule extends MyBatisModule {
|
|||||||
addMapperClass(UserPermissionMapper.class);
|
addMapperClass(UserPermissionMapper.class);
|
||||||
|
|
||||||
// Bind core implementations of guacamole-ext classes
|
// Bind core implementations of guacamole-ext classes
|
||||||
|
bind(ActiveConnectionDirectory.class);
|
||||||
|
bind(ActiveConnectionPermissionSet.class);
|
||||||
bind(Environment.class).toInstance(environment);
|
bind(Environment.class).toInstance(environment);
|
||||||
bind(ConnectionDirectory.class);
|
bind(ConnectionDirectory.class);
|
||||||
bind(ConnectionGroupDirectory.class);
|
bind(ConnectionGroupDirectory.class);
|
||||||
@@ -131,11 +138,14 @@ public class JDBCAuthenticationProviderModule extends MyBatisModule {
|
|||||||
bind(ModeledUser.class);
|
bind(ModeledUser.class);
|
||||||
bind(RootConnectionGroup.class);
|
bind(RootConnectionGroup.class);
|
||||||
bind(SystemPermissionSet.class);
|
bind(SystemPermissionSet.class);
|
||||||
|
bind(TrackedActiveConnection.class);
|
||||||
bind(UserContext.class);
|
bind(UserContext.class);
|
||||||
bind(UserDirectory.class);
|
bind(UserDirectory.class);
|
||||||
bind(UserPermissionSet.class);
|
bind(UserPermissionSet.class);
|
||||||
|
|
||||||
// Bind services
|
// Bind services
|
||||||
|
bind(ActiveConnectionService.class);
|
||||||
|
bind(ActiveConnectionPermissionService.class);
|
||||||
bind(ConnectionGroupPermissionService.class);
|
bind(ConnectionGroupPermissionService.class);
|
||||||
bind(ConnectionGroupService.class);
|
bind(ConnectionGroupService.class);
|
||||||
bind(ConnectionPermissionService.class);
|
bind(ConnectionPermissionService.class);
|
||||||
|
@@ -0,0 +1,83 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (C) 2013 Glyptodon LLC
|
||||||
|
*
|
||||||
|
* Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
* of this software and associated documentation files (the "Software"), to deal
|
||||||
|
* in the Software without restriction, including without limitation the rights
|
||||||
|
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
||||||
|
* copies of the Software, and to permit persons to whom the Software is
|
||||||
|
* furnished to do so, subject to the following conditions:
|
||||||
|
*
|
||||||
|
* The above copyright notice and this permission notice shall be included in
|
||||||
|
* all copies or substantial portions of the Software.
|
||||||
|
*
|
||||||
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
||||||
|
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
||||||
|
* THE SOFTWARE.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package org.glyptodon.guacamole.auth.jdbc.activeconnection;
|
||||||
|
|
||||||
|
|
||||||
|
import com.google.inject.Inject;
|
||||||
|
import java.util.Collection;
|
||||||
|
import java.util.Collections;
|
||||||
|
import java.util.Set;
|
||||||
|
import org.glyptodon.guacamole.GuacamoleException;
|
||||||
|
import org.glyptodon.guacamole.auth.jdbc.base.RestrictedObject;
|
||||||
|
import org.glyptodon.guacamole.net.auth.ActiveConnection;
|
||||||
|
import org.glyptodon.guacamole.net.auth.Directory;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Implementation of a Directory which contains all currently-active
|
||||||
|
* connections.
|
||||||
|
*
|
||||||
|
* @author Michael Jumper
|
||||||
|
*/
|
||||||
|
public class ActiveConnectionDirectory extends RestrictedObject
|
||||||
|
implements Directory<ActiveConnection> {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Service for retrieving and manipulating active connections.
|
||||||
|
*/
|
||||||
|
@Inject
|
||||||
|
private ActiveConnectionService activeConnectionService;
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public ActiveConnection get(String identifier) throws GuacamoleException {
|
||||||
|
return activeConnectionService.retrieveObject(getCurrentUser(), identifier);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Collection<ActiveConnection> getAll(Collection<String> identifiers)
|
||||||
|
throws GuacamoleException {
|
||||||
|
Collection<TrackedActiveConnection> objects = activeConnectionService.retrieveObjects(getCurrentUser(), identifiers);
|
||||||
|
return Collections.<ActiveConnection>unmodifiableCollection(objects);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Set<String> getIdentifiers() throws GuacamoleException {
|
||||||
|
return activeConnectionService.getIdentifiers(getCurrentUser());
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void add(ActiveConnection object) throws GuacamoleException {
|
||||||
|
activeConnectionService.createObject(getCurrentUser(), object);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void update(ActiveConnection object) throws GuacamoleException {
|
||||||
|
TrackedActiveConnection connection = (TrackedActiveConnection) object;
|
||||||
|
activeConnectionService.updateObject(getCurrentUser(), connection);
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void remove(String identifier) throws GuacamoleException {
|
||||||
|
activeConnectionService.deleteObject(getCurrentUser(), identifier);
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
@@ -0,0 +1,174 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (C) 2015 Glyptodon LLC
|
||||||
|
*
|
||||||
|
* Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
* of this software and associated documentation files (the "Software"), to deal
|
||||||
|
* in the Software without restriction, including without limitation the rights
|
||||||
|
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
||||||
|
* copies of the Software, and to permit persons to whom the Software is
|
||||||
|
* furnished to do so, subject to the following conditions:
|
||||||
|
*
|
||||||
|
* The above copyright notice and this permission notice shall be included in
|
||||||
|
* all copies or substantial portions of the Software.
|
||||||
|
*
|
||||||
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
||||||
|
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
||||||
|
* THE SOFTWARE.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package org.glyptodon.guacamole.auth.jdbc.activeconnection;
|
||||||
|
|
||||||
|
import com.google.inject.Inject;
|
||||||
|
import com.google.inject.Provider;
|
||||||
|
import java.util.ArrayList;
|
||||||
|
import java.util.Collection;
|
||||||
|
import java.util.Collections;
|
||||||
|
import java.util.HashSet;
|
||||||
|
import java.util.Set;
|
||||||
|
import org.glyptodon.guacamole.GuacamoleException;
|
||||||
|
import org.glyptodon.guacamole.GuacamoleSecurityException;
|
||||||
|
import org.glyptodon.guacamole.auth.jdbc.permission.AbstractPermissionService;
|
||||||
|
import org.glyptodon.guacamole.auth.jdbc.permission.ObjectPermissionService;
|
||||||
|
import org.glyptodon.guacamole.auth.jdbc.tunnel.ActiveConnectionRecord;
|
||||||
|
import org.glyptodon.guacamole.auth.jdbc.tunnel.GuacamoleTunnelService;
|
||||||
|
import org.glyptodon.guacamole.auth.jdbc.user.AuthenticatedUser;
|
||||||
|
import org.glyptodon.guacamole.auth.jdbc.user.ModeledUser;
|
||||||
|
import org.glyptodon.guacamole.net.auth.permission.ObjectPermission;
|
||||||
|
import org.glyptodon.guacamole.net.auth.permission.ObjectPermissionSet;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Service which provides convenience methods for creating, retrieving, and
|
||||||
|
* manipulating active connections.
|
||||||
|
*
|
||||||
|
* @author Michael Jumper
|
||||||
|
*/
|
||||||
|
public class ActiveConnectionPermissionService
|
||||||
|
extends AbstractPermissionService<ObjectPermissionSet, ObjectPermission>
|
||||||
|
implements ObjectPermissionService {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Service for creating and tracking tunnels.
|
||||||
|
*/
|
||||||
|
@Inject
|
||||||
|
private GuacamoleTunnelService tunnelService;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Provider for active connection permission sets.
|
||||||
|
*/
|
||||||
|
@Inject
|
||||||
|
private Provider<ActiveConnectionPermissionSet> activeConnectionPermissionSetProvider;
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public ObjectPermission retrievePermission(AuthenticatedUser user,
|
||||||
|
ModeledUser targetUser, ObjectPermission.Type type,
|
||||||
|
String identifier) throws GuacamoleException {
|
||||||
|
|
||||||
|
// Retrieve permissions
|
||||||
|
Set<ObjectPermission> permissions = retrievePermissions(user, targetUser);
|
||||||
|
|
||||||
|
// If retrieved permissions contains the requested permission, return it
|
||||||
|
ObjectPermission permission = new ObjectPermission(type, identifier);
|
||||||
|
if (permissions.contains(permission))
|
||||||
|
return permission;
|
||||||
|
|
||||||
|
// Otherwise, no such permission
|
||||||
|
return null;
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Set<ObjectPermission> retrievePermissions(AuthenticatedUser user,
|
||||||
|
ModeledUser targetUser) throws GuacamoleException {
|
||||||
|
|
||||||
|
// Retrieve permissions only if allowed
|
||||||
|
if (canReadPermissions(user, targetUser)) {
|
||||||
|
|
||||||
|
// Only administrators may access active connections
|
||||||
|
if (!targetUser.isAdministrator())
|
||||||
|
return Collections.EMPTY_SET;
|
||||||
|
|
||||||
|
// Get all active connections
|
||||||
|
Collection<ActiveConnectionRecord> records = tunnelService.getActiveConnections(user);
|
||||||
|
|
||||||
|
// We have READ and DELETE on all active connections
|
||||||
|
Set<ObjectPermission> permissions = new HashSet<ObjectPermission>();
|
||||||
|
for (ActiveConnectionRecord record : records) {
|
||||||
|
|
||||||
|
// Add implicit READ and DELETE
|
||||||
|
String identifier = record.getUUID().toString();
|
||||||
|
permissions.add(new ObjectPermission(ObjectPermission.Type.READ, identifier));
|
||||||
|
permissions.add(new ObjectPermission(ObjectPermission.Type.DELETE, identifier));
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
return permissions;
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
throw new GuacamoleSecurityException("Permission denied.");
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Collection<String> retrieveAccessibleIdentifiers(AuthenticatedUser user,
|
||||||
|
ModeledUser targetUser, Collection<ObjectPermission.Type> permissionTypes,
|
||||||
|
Collection<String> identifiers) throws GuacamoleException {
|
||||||
|
|
||||||
|
Set<ObjectPermission> permissions = retrievePermissions(user, targetUser);
|
||||||
|
Collection<String> accessibleObjects = new ArrayList<String>(permissions.size());
|
||||||
|
|
||||||
|
// For each identifier/permission combination
|
||||||
|
for (String identifier : identifiers) {
|
||||||
|
for (ObjectPermission.Type permissionType : permissionTypes) {
|
||||||
|
|
||||||
|
// Add identifier if at least one requested permission is granted
|
||||||
|
ObjectPermission permission = new ObjectPermission(permissionType, identifier);
|
||||||
|
if (permissions.contains(permission)) {
|
||||||
|
accessibleObjects.add(identifier);
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return accessibleObjects;
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public ObjectPermissionSet getPermissionSet(AuthenticatedUser user,
|
||||||
|
ModeledUser targetUser) throws GuacamoleException {
|
||||||
|
|
||||||
|
// Create permission set for requested user
|
||||||
|
ActiveConnectionPermissionSet permissionSet = activeConnectionPermissionSetProvider.get();
|
||||||
|
permissionSet.init(user, targetUser);
|
||||||
|
|
||||||
|
return permissionSet;
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void createPermissions(AuthenticatedUser user,
|
||||||
|
ModeledUser targetUser, Collection<ObjectPermission> permissions)
|
||||||
|
throws GuacamoleException {
|
||||||
|
|
||||||
|
// Creating active connection permissions is not implemented
|
||||||
|
throw new GuacamoleSecurityException("Permission denied.");
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void deletePermissions(AuthenticatedUser user,
|
||||||
|
ModeledUser targetUser, Collection<ObjectPermission> permissions)
|
||||||
|
throws GuacamoleException {
|
||||||
|
|
||||||
|
// Deleting active connection permissions is not implemented
|
||||||
|
throw new GuacamoleSecurityException("Permission denied.");
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
@@ -0,0 +1,48 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (C) 2015 Glyptodon LLC
|
||||||
|
*
|
||||||
|
* Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
* of this software and associated documentation files (the "Software"), to deal
|
||||||
|
* in the Software without restriction, including without limitation the rights
|
||||||
|
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
||||||
|
* copies of the Software, and to permit persons to whom the Software is
|
||||||
|
* furnished to do so, subject to the following conditions:
|
||||||
|
*
|
||||||
|
* The above copyright notice and this permission notice shall be included in
|
||||||
|
* all copies or substantial portions of the Software.
|
||||||
|
*
|
||||||
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
||||||
|
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
||||||
|
* THE SOFTWARE.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package org.glyptodon.guacamole.auth.jdbc.activeconnection;
|
||||||
|
|
||||||
|
import com.google.inject.Inject;
|
||||||
|
import org.glyptodon.guacamole.auth.jdbc.permission.ObjectPermissionService;
|
||||||
|
import org.glyptodon.guacamole.auth.jdbc.permission.ObjectPermissionSet;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* An implementation of ObjectPermissionSet which uses an injected service to
|
||||||
|
* query and manipulate the permissions associated with active connections.
|
||||||
|
*
|
||||||
|
* @author Michael Jumper
|
||||||
|
*/
|
||||||
|
public class ActiveConnectionPermissionSet extends ObjectPermissionSet {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Service for querying and manipulating active connection permissions.
|
||||||
|
*/
|
||||||
|
@Inject
|
||||||
|
private ActiveConnectionPermissionService activeConnectionPermissionService;
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected ObjectPermissionService getObjectPermissionService() {
|
||||||
|
return activeConnectionPermissionService;
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
@@ -0,0 +1,151 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (C) 2015 Glyptodon LLC
|
||||||
|
*
|
||||||
|
* Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
* of this software and associated documentation files (the "Software"), to deal
|
||||||
|
* in the Software without restriction, including without limitation the rights
|
||||||
|
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
||||||
|
* copies of the Software, and to permit persons to whom the Software is
|
||||||
|
* furnished to do so, subject to the following conditions:
|
||||||
|
*
|
||||||
|
* The above copyright notice and this permission notice shall be included in
|
||||||
|
* all copies or substantial portions of the Software.
|
||||||
|
*
|
||||||
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
||||||
|
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
||||||
|
* THE SOFTWARE.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package org.glyptodon.guacamole.auth.jdbc.activeconnection;
|
||||||
|
|
||||||
|
import com.google.inject.Inject;
|
||||||
|
import com.google.inject.Provider;
|
||||||
|
import java.util.ArrayList;
|
||||||
|
import java.util.Collection;
|
||||||
|
import java.util.HashSet;
|
||||||
|
import java.util.Set;
|
||||||
|
import org.glyptodon.guacamole.auth.jdbc.user.AuthenticatedUser;
|
||||||
|
import org.glyptodon.guacamole.GuacamoleException;
|
||||||
|
import org.glyptodon.guacamole.GuacamoleSecurityException;
|
||||||
|
import org.glyptodon.guacamole.auth.jdbc.base.DirectoryObjectService;
|
||||||
|
import org.glyptodon.guacamole.auth.jdbc.tunnel.ActiveConnectionRecord;
|
||||||
|
import org.glyptodon.guacamole.auth.jdbc.tunnel.GuacamoleTunnelService;
|
||||||
|
import org.glyptodon.guacamole.net.GuacamoleTunnel;
|
||||||
|
import org.glyptodon.guacamole.net.auth.ActiveConnection;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Service which provides convenience methods for creating, retrieving, and
|
||||||
|
* manipulating active connections.
|
||||||
|
*
|
||||||
|
* @author Michael Jumper
|
||||||
|
*/
|
||||||
|
public class ActiveConnectionService
|
||||||
|
implements DirectoryObjectService<TrackedActiveConnection, ActiveConnection> {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Service for creating and tracking tunnels.
|
||||||
|
*/
|
||||||
|
@Inject
|
||||||
|
private GuacamoleTunnelService tunnelService;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Provider for active connections.
|
||||||
|
*/
|
||||||
|
@Inject
|
||||||
|
private Provider<TrackedActiveConnection> trackedActiveConnectionProvider;
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public TrackedActiveConnection retrieveObject(AuthenticatedUser user,
|
||||||
|
String identifier) throws GuacamoleException {
|
||||||
|
|
||||||
|
// Only administrators may retrieve active connections
|
||||||
|
if (!user.getUser().isAdministrator())
|
||||||
|
throw new GuacamoleSecurityException("Permission denied.");
|
||||||
|
|
||||||
|
// Retrieve record associated with requested connection
|
||||||
|
ActiveConnectionRecord record = tunnelService.getActiveConnection(user, identifier);
|
||||||
|
if (record == null)
|
||||||
|
return null;
|
||||||
|
|
||||||
|
// Return tracked active connection using retrieved record
|
||||||
|
TrackedActiveConnection activeConnection = trackedActiveConnectionProvider.get();
|
||||||
|
activeConnection.init(user, record);
|
||||||
|
return activeConnection;
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Collection<TrackedActiveConnection> retrieveObjects(AuthenticatedUser user,
|
||||||
|
Collection<String> identifiers) throws GuacamoleException {
|
||||||
|
|
||||||
|
// Build list of all active connections with given identifiers
|
||||||
|
Collection<TrackedActiveConnection> activeConnections = new ArrayList<TrackedActiveConnection>(identifiers.size());
|
||||||
|
for (String identifier : identifiers) {
|
||||||
|
|
||||||
|
// Add connection to list if it exists
|
||||||
|
TrackedActiveConnection activeConnection = retrieveObject(user, identifier);
|
||||||
|
if (activeConnection != null)
|
||||||
|
activeConnections.add(activeConnection);
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
return activeConnections;
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void deleteObject(AuthenticatedUser user, String identifier)
|
||||||
|
throws GuacamoleException {
|
||||||
|
|
||||||
|
// Close connection, if it exists (and we have permission)
|
||||||
|
ActiveConnection activeConnection = retrieveObject(user, identifier);
|
||||||
|
if (activeConnection != null) {
|
||||||
|
|
||||||
|
// Close connection if not already closed
|
||||||
|
GuacamoleTunnel tunnel = activeConnection.getTunnel();
|
||||||
|
if (tunnel != null && tunnel.isOpen())
|
||||||
|
tunnel.close();
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Set<String> getIdentifiers(AuthenticatedUser user)
|
||||||
|
throws GuacamoleException {
|
||||||
|
|
||||||
|
// Retrieve all visible connections (permissions enforced by tunnel service)
|
||||||
|
Collection<ActiveConnectionRecord> records = tunnelService.getActiveConnections(user);
|
||||||
|
|
||||||
|
// Build list of identifiers
|
||||||
|
Set<String> identifiers = new HashSet<String>(records.size());
|
||||||
|
for (ActiveConnectionRecord record : records)
|
||||||
|
identifiers.add(record.getUUID().toString());
|
||||||
|
|
||||||
|
return identifiers;
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public TrackedActiveConnection createObject(AuthenticatedUser user,
|
||||||
|
ActiveConnection object) throws GuacamoleException {
|
||||||
|
|
||||||
|
// Updating active connections is not implemented
|
||||||
|
throw new GuacamoleSecurityException("Permission denied.");
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void updateObject(AuthenticatedUser user, TrackedActiveConnection object)
|
||||||
|
throws GuacamoleException {
|
||||||
|
|
||||||
|
// Updating active connections is not implemented
|
||||||
|
throw new GuacamoleSecurityException("Permission denied.");
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
@@ -0,0 +1,155 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (C) 2015 Glyptodon LLC
|
||||||
|
*
|
||||||
|
* Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
* of this software and associated documentation files (the "Software"), to deal
|
||||||
|
* in the Software without restriction, including without limitation the rights
|
||||||
|
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
||||||
|
* copies of the Software, and to permit persons to whom the Software is
|
||||||
|
* furnished to do so, subject to the following conditions:
|
||||||
|
*
|
||||||
|
* The above copyright notice and this permission notice shall be included in
|
||||||
|
* all copies or substantial portions of the Software.
|
||||||
|
*
|
||||||
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
||||||
|
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
||||||
|
* THE SOFTWARE.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package org.glyptodon.guacamole.auth.jdbc.activeconnection;
|
||||||
|
|
||||||
|
import java.util.Date;
|
||||||
|
import org.glyptodon.guacamole.auth.jdbc.base.RestrictedObject;
|
||||||
|
import org.glyptodon.guacamole.auth.jdbc.tunnel.ActiveConnectionRecord;
|
||||||
|
import org.glyptodon.guacamole.auth.jdbc.user.AuthenticatedUser;
|
||||||
|
import org.glyptodon.guacamole.net.GuacamoleTunnel;
|
||||||
|
import org.glyptodon.guacamole.net.auth.ActiveConnection;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* An implementation of the ActiveConnection object which has an associated
|
||||||
|
* ActiveConnectionRecord.
|
||||||
|
*
|
||||||
|
* @author Michael Jumper
|
||||||
|
*/
|
||||||
|
public class TrackedActiveConnection extends RestrictedObject implements ActiveConnection {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The identifier of this active connection.
|
||||||
|
*/
|
||||||
|
private String identifier;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The identifier of the associated connection.
|
||||||
|
*/
|
||||||
|
private String connectionIdentifier;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The date and time this active connection began.
|
||||||
|
*/
|
||||||
|
private Date startDate;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The remote host that initiated this connection.
|
||||||
|
*/
|
||||||
|
private String remoteHost;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The username of the user that initiated this connection.
|
||||||
|
*/
|
||||||
|
private String username;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The underlying GuacamoleTunnel.
|
||||||
|
*/
|
||||||
|
private GuacamoleTunnel tunnel;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Initializes this TrackedActiveConnection, copying the data associated
|
||||||
|
* with the given active connection record.
|
||||||
|
*
|
||||||
|
* @param currentUser
|
||||||
|
* The user that created or retrieved this object.
|
||||||
|
*
|
||||||
|
* @param activeConnectionRecord
|
||||||
|
* The active connection record to copy.
|
||||||
|
*/
|
||||||
|
public void init(AuthenticatedUser currentUser,
|
||||||
|
ActiveConnectionRecord activeConnectionRecord) {
|
||||||
|
|
||||||
|
super.init(currentUser);
|
||||||
|
|
||||||
|
// Copy all data from given record
|
||||||
|
this.connectionIdentifier = activeConnectionRecord.getConnection().getIdentifier();
|
||||||
|
this.identifier = activeConnectionRecord.getUUID().toString();
|
||||||
|
this.remoteHost = activeConnectionRecord.getRemoteHost();
|
||||||
|
this.startDate = activeConnectionRecord.getStartDate();
|
||||||
|
this.tunnel = activeConnectionRecord.getTunnel();
|
||||||
|
this.username = activeConnectionRecord.getUsername();
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String getIdentifier() {
|
||||||
|
return identifier;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void setIdentifier(String identifier) {
|
||||||
|
this.identifier = identifier;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String getConnectionIdentifier() {
|
||||||
|
return connectionIdentifier;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void setConnectionIdentifier(String connnectionIdentifier) {
|
||||||
|
this.connectionIdentifier = connnectionIdentifier;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Date getStartDate() {
|
||||||
|
return startDate;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void setStartDate(Date startDate) {
|
||||||
|
this.startDate = startDate;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String getRemoteHost() {
|
||||||
|
return remoteHost;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void setRemoteHost(String remoteHost) {
|
||||||
|
this.remoteHost = remoteHost;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String getUsername() {
|
||||||
|
return username;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void setUsername(String username) {
|
||||||
|
this.username = username;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public GuacamoleTunnel getTunnel() {
|
||||||
|
return tunnel;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void setTunnel(GuacamoleTunnel tunnel) {
|
||||||
|
this.tunnel = tunnel;
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
@@ -0,0 +1,26 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (C) 2015 Glyptodon LLC
|
||||||
|
*
|
||||||
|
* Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
* of this software and associated documentation files (the "Software"), to deal
|
||||||
|
* in the Software without restriction, including without limitation the rights
|
||||||
|
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
||||||
|
* copies of the Software, and to permit persons to whom the Software is
|
||||||
|
* furnished to do so, subject to the following conditions:
|
||||||
|
*
|
||||||
|
* The above copyright notice and this permission notice shall be included in
|
||||||
|
* all copies or substantial portions of the Software.
|
||||||
|
*
|
||||||
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
||||||
|
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
||||||
|
* THE SOFTWARE.
|
||||||
|
*/
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Classes related to currently-active connections.
|
||||||
|
*/
|
||||||
|
package org.glyptodon.guacamole.auth.jdbc.activeconnection;
|
@@ -22,23 +22,16 @@
|
|||||||
|
|
||||||
package org.glyptodon.guacamole.auth.jdbc.base;
|
package org.glyptodon.guacamole.auth.jdbc.base;
|
||||||
|
|
||||||
import java.util.ArrayList;
|
|
||||||
import java.util.Collection;
|
import java.util.Collection;
|
||||||
import java.util.Collections;
|
|
||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
import org.glyptodon.guacamole.auth.jdbc.user.AuthenticatedUser;
|
import org.glyptodon.guacamole.auth.jdbc.user.AuthenticatedUser;
|
||||||
import org.glyptodon.guacamole.GuacamoleException;
|
import org.glyptodon.guacamole.GuacamoleException;
|
||||||
import org.glyptodon.guacamole.GuacamoleSecurityException;
|
|
||||||
import org.glyptodon.guacamole.auth.jdbc.permission.ObjectPermissionMapper;
|
|
||||||
import org.glyptodon.guacamole.auth.jdbc.permission.ObjectPermissionModel;
|
|
||||||
import org.glyptodon.guacamole.auth.jdbc.user.UserModel;
|
|
||||||
import org.glyptodon.guacamole.net.auth.permission.ObjectPermission;
|
|
||||||
import org.glyptodon.guacamole.net.auth.permission.ObjectPermissionSet;
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Service which provides convenience methods for creating, retrieving, and
|
* Service which provides convenience methods for creating, retrieving, and
|
||||||
* manipulating objects within directories. This service will automatically
|
* manipulating objects that have unique identifiers, such as the objects
|
||||||
* enforce the permissions of the current user.
|
* within directories. This service will automatically enforce the permissions
|
||||||
|
* of the current user.
|
||||||
*
|
*
|
||||||
* @author Michael Jumper
|
* @author Michael Jumper
|
||||||
* @param <InternalType>
|
* @param <InternalType>
|
||||||
@@ -48,246 +41,8 @@ import org.glyptodon.guacamole.net.auth.permission.ObjectPermissionSet;
|
|||||||
* @param <ExternalType>
|
* @param <ExternalType>
|
||||||
* The external interface or implementation of the type of object this
|
* The external interface or implementation of the type of object this
|
||||||
* service provides access to, as defined by the guacamole-ext API.
|
* service provides access to, as defined by the guacamole-ext API.
|
||||||
*
|
|
||||||
* @param <ModelType>
|
|
||||||
* The underlying model object used to represent InternalType in the
|
|
||||||
* database.
|
|
||||||
*/
|
*/
|
||||||
public abstract class DirectoryObjectService<InternalType extends DirectoryObject<ModelType>,
|
public interface DirectoryObjectService<InternalType, ExternalType> {
|
||||||
ExternalType, ModelType extends ObjectModel> {
|
|
||||||
|
|
||||||
/**
|
|
||||||
* All object permissions which are implicitly granted upon creation to the
|
|
||||||
* creator of the object.
|
|
||||||
*/
|
|
||||||
private static final ObjectPermission.Type[] IMPLICIT_OBJECT_PERMISSIONS = {
|
|
||||||
ObjectPermission.Type.READ,
|
|
||||||
ObjectPermission.Type.UPDATE,
|
|
||||||
ObjectPermission.Type.DELETE,
|
|
||||||
ObjectPermission.Type.ADMINISTER
|
|
||||||
};
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns an instance of a mapper for the type of object used by this
|
|
||||||
* service.
|
|
||||||
*
|
|
||||||
* @return
|
|
||||||
* A mapper which provides access to the model objects associated with
|
|
||||||
* the objects used by this service.
|
|
||||||
*/
|
|
||||||
protected abstract DirectoryObjectMapper<ModelType> getObjectMapper();
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns an instance of a mapper for the type of permissions that affect
|
|
||||||
* the type of object used by this service.
|
|
||||||
*
|
|
||||||
* @return
|
|
||||||
* A mapper which provides access to the model objects associated with
|
|
||||||
* the permissions that affect the objects used by this service.
|
|
||||||
*/
|
|
||||||
protected abstract ObjectPermissionMapper getPermissionMapper();
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns an instance of an object which is backed by the given model
|
|
||||||
* object.
|
|
||||||
*
|
|
||||||
* @param currentUser
|
|
||||||
* The user for whom this object is being created.
|
|
||||||
*
|
|
||||||
* @param model
|
|
||||||
* The model object to use to back the returned object.
|
|
||||||
*
|
|
||||||
* @return
|
|
||||||
* An object which is backed by the given model object.
|
|
||||||
*/
|
|
||||||
protected abstract InternalType getObjectInstance(AuthenticatedUser currentUser,
|
|
||||||
ModelType model);
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns an instance of a model object which is based on the given
|
|
||||||
* object.
|
|
||||||
*
|
|
||||||
* @param currentUser
|
|
||||||
* The user for whom this model object is being created.
|
|
||||||
*
|
|
||||||
* @param object
|
|
||||||
* The object to use to produce the returned model object.
|
|
||||||
*
|
|
||||||
* @return
|
|
||||||
* A model object which is based on the given object.
|
|
||||||
*/
|
|
||||||
protected abstract ModelType getModelInstance(AuthenticatedUser currentUser,
|
|
||||||
ExternalType object);
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns whether the given user has permission to create the type of
|
|
||||||
* objects that this directory object service manages.
|
|
||||||
*
|
|
||||||
* @param user
|
|
||||||
* The user being checked.
|
|
||||||
*
|
|
||||||
* @return
|
|
||||||
* true if the user has object creation permission relevant to this
|
|
||||||
* directory object service, false otherwise.
|
|
||||||
*
|
|
||||||
* @throws GuacamoleException
|
|
||||||
* If permission to read the user's permissions is denied.
|
|
||||||
*/
|
|
||||||
protected abstract boolean hasCreatePermission(AuthenticatedUser user)
|
|
||||||
throws GuacamoleException;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns whether the given user has permission to perform a certain
|
|
||||||
* action on a specific object managed by this directory object service.
|
|
||||||
*
|
|
||||||
* @param user
|
|
||||||
* The user being checked.
|
|
||||||
*
|
|
||||||
* @param identifier
|
|
||||||
* The identifier of the object to check.
|
|
||||||
*
|
|
||||||
* @param type
|
|
||||||
* The type of action that will be performed.
|
|
||||||
*
|
|
||||||
* @return
|
|
||||||
* true if the user has object permission relevant described, false
|
|
||||||
* otherwise.
|
|
||||||
*
|
|
||||||
* @throws GuacamoleException
|
|
||||||
* If permission to read the user's permissions is denied.
|
|
||||||
*/
|
|
||||||
protected boolean hasObjectPermission(AuthenticatedUser user,
|
|
||||||
String identifier, ObjectPermission.Type type)
|
|
||||||
throws GuacamoleException {
|
|
||||||
|
|
||||||
// Get object permissions
|
|
||||||
ObjectPermissionSet permissionSet = getPermissionSet(user);
|
|
||||||
|
|
||||||
// Return whether permission is granted
|
|
||||||
return user.getUser().isAdministrator()
|
|
||||||
|| permissionSet.hasPermission(type, identifier);
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns the permission set associated with the given user and related
|
|
||||||
* to the type of objects handled by this directory object service.
|
|
||||||
*
|
|
||||||
* @param user
|
|
||||||
* The user whose permissions are being retrieved.
|
|
||||||
*
|
|
||||||
* @return
|
|
||||||
* A permission set which contains the permissions associated with the
|
|
||||||
* given user and related to the type of objects handled by this
|
|
||||||
* directory object service.
|
|
||||||
*
|
|
||||||
* @throws GuacamoleException
|
|
||||||
* If permission to read the user's permissions is denied.
|
|
||||||
*/
|
|
||||||
protected abstract ObjectPermissionSet getPermissionSet(AuthenticatedUser user)
|
|
||||||
throws GuacamoleException;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns a collection of objects which are backed by the models in the
|
|
||||||
* given collection.
|
|
||||||
*
|
|
||||||
* @param currentUser
|
|
||||||
* The user for whom these objects are being created.
|
|
||||||
*
|
|
||||||
* @param models
|
|
||||||
* The model objects to use to back the objects within the returned
|
|
||||||
* collection.
|
|
||||||
*
|
|
||||||
* @return
|
|
||||||
* A collection of objects which are backed by the models in the given
|
|
||||||
* collection.
|
|
||||||
*/
|
|
||||||
protected Collection<InternalType> getObjectInstances(AuthenticatedUser currentUser,
|
|
||||||
Collection<ModelType> models) {
|
|
||||||
|
|
||||||
// Create new collection of objects by manually converting each model
|
|
||||||
Collection<InternalType> objects = new ArrayList<InternalType>(models.size());
|
|
||||||
for (ModelType model : models)
|
|
||||||
objects.add(getObjectInstance(currentUser, model));
|
|
||||||
|
|
||||||
return objects;
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Called before any object is created through this directory object
|
|
||||||
* service. This function serves as a final point of validation before
|
|
||||||
* the create operation occurs. In its default implementation,
|
|
||||||
* beforeCreate() performs basic permissions checks.
|
|
||||||
*
|
|
||||||
* @param user
|
|
||||||
* The user creating the object.
|
|
||||||
*
|
|
||||||
* @param model
|
|
||||||
* The model of the object being created.
|
|
||||||
*
|
|
||||||
* @throws GuacamoleException
|
|
||||||
* If the object is invalid, or an error prevents validating the given
|
|
||||||
* object.
|
|
||||||
*/
|
|
||||||
protected void beforeCreate(AuthenticatedUser user,
|
|
||||||
ModelType model ) throws GuacamoleException {
|
|
||||||
|
|
||||||
// Verify permission to create objects
|
|
||||||
if (!user.getUser().isAdministrator() && !hasCreatePermission(user))
|
|
||||||
throw new GuacamoleSecurityException("Permission denied.");
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Called before any object is updated through this directory object
|
|
||||||
* service. This function serves as a final point of validation before
|
|
||||||
* the update operation occurs. In its default implementation,
|
|
||||||
* beforeUpdate() performs basic permissions checks.
|
|
||||||
*
|
|
||||||
* @param user
|
|
||||||
* The user updating the existing object.
|
|
||||||
*
|
|
||||||
* @param model
|
|
||||||
* The model of the object being updated.
|
|
||||||
*
|
|
||||||
* @throws GuacamoleException
|
|
||||||
* If the object is invalid, or an error prevents validating the given
|
|
||||||
* object.
|
|
||||||
*/
|
|
||||||
protected void beforeUpdate(AuthenticatedUser user,
|
|
||||||
ModelType model) throws GuacamoleException {
|
|
||||||
|
|
||||||
// By default, do nothing.
|
|
||||||
if (!hasObjectPermission(user, model.getIdentifier(), ObjectPermission.Type.UPDATE))
|
|
||||||
throw new GuacamoleSecurityException("Permission denied.");
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Called before any object is deleted through this directory object
|
|
||||||
* service. This function serves as a final point of validation before
|
|
||||||
* the delete operation occurs. In its default implementation,
|
|
||||||
* beforeDelete() performs basic permissions checks.
|
|
||||||
*
|
|
||||||
* @param user
|
|
||||||
* The user deleting the existing object.
|
|
||||||
*
|
|
||||||
* @param identifier
|
|
||||||
* The identifier of the object being deleted.
|
|
||||||
*
|
|
||||||
* @throws GuacamoleException
|
|
||||||
* If the object is invalid, or an error prevents validating the given
|
|
||||||
* object.
|
|
||||||
*/
|
|
||||||
protected void beforeDelete(AuthenticatedUser user,
|
|
||||||
String identifier) throws GuacamoleException {
|
|
||||||
|
|
||||||
// Verify permission to delete objects
|
|
||||||
if (!hasObjectPermission(user, identifier, ObjectPermission.Type.DELETE))
|
|
||||||
throw new GuacamoleSecurityException("Permission denied.");
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Retrieves the single object that has the given identifier, if it exists
|
* Retrieves the single object that has the given identifier, if it exists
|
||||||
@@ -306,24 +61,8 @@ public abstract class DirectoryObjectService<InternalType extends DirectoryObjec
|
|||||||
* @throws GuacamoleException
|
* @throws GuacamoleException
|
||||||
* If an error occurs while retrieving the requested object.
|
* If an error occurs while retrieving the requested object.
|
||||||
*/
|
*/
|
||||||
public InternalType retrieveObject(AuthenticatedUser user,
|
InternalType retrieveObject(AuthenticatedUser user, String identifier)
|
||||||
String identifier) throws GuacamoleException {
|
throws GuacamoleException;
|
||||||
|
|
||||||
// Pull objects having given identifier
|
|
||||||
Collection<InternalType> objects = retrieveObjects(user, Collections.singleton(identifier));
|
|
||||||
|
|
||||||
// If no such object, return null
|
|
||||||
if (objects.isEmpty())
|
|
||||||
return null;
|
|
||||||
|
|
||||||
// The object collection will have exactly one element unless the
|
|
||||||
// database has seriously lost integrity
|
|
||||||
assert(objects.size() == 1);
|
|
||||||
|
|
||||||
// Return first and only object
|
|
||||||
return objects.iterator().next();
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Retrieves all objects that have the identifiers in the given collection.
|
* Retrieves all objects that have the identifiers in the given collection.
|
||||||
@@ -341,73 +80,12 @@ public abstract class DirectoryObjectService<InternalType extends DirectoryObjec
|
|||||||
* @throws GuacamoleException
|
* @throws GuacamoleException
|
||||||
* If an error occurs while retrieving the requested objects.
|
* If an error occurs while retrieving the requested objects.
|
||||||
*/
|
*/
|
||||||
public Collection<InternalType> retrieveObjects(AuthenticatedUser user,
|
Collection<InternalType> retrieveObjects(AuthenticatedUser user,
|
||||||
Collection<String> identifiers) throws GuacamoleException {
|
Collection<String> identifiers) throws GuacamoleException;
|
||||||
|
|
||||||
// Do not query if no identifiers given
|
|
||||||
if (identifiers.isEmpty())
|
|
||||||
return Collections.EMPTY_LIST;
|
|
||||||
|
|
||||||
Collection<ModelType> objects;
|
|
||||||
|
|
||||||
// Bypass permission checks if the user is a system admin
|
|
||||||
if (user.getUser().isAdministrator())
|
|
||||||
objects = getObjectMapper().select(identifiers);
|
|
||||||
|
|
||||||
// Otherwise only return explicitly readable identifiers
|
|
||||||
else
|
|
||||||
objects = getObjectMapper().selectReadable(user.getUser().getModel(), identifiers);
|
|
||||||
|
|
||||||
// Return collection of requested objects
|
|
||||||
return getObjectInstances(user, objects);
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns a collection of permissions that should be granted due to the
|
* Creates the given object. If the object already exists, an error will be
|
||||||
* creation of the given object. These permissions need not be granted
|
* thrown.
|
||||||
* solely to the user creating the object.
|
|
||||||
*
|
|
||||||
* @param user
|
|
||||||
* The user creating the object.
|
|
||||||
*
|
|
||||||
* @param model
|
|
||||||
* The object being created.
|
|
||||||
*
|
|
||||||
* @return
|
|
||||||
* The collection of implicit permissions that should be granted due to
|
|
||||||
* the creation of the given object.
|
|
||||||
*/
|
|
||||||
protected Collection<ObjectPermissionModel> getImplicitPermissions(AuthenticatedUser user,
|
|
||||||
ModelType model) {
|
|
||||||
|
|
||||||
// Build list of implicit permissions
|
|
||||||
Collection<ObjectPermissionModel> implicitPermissions =
|
|
||||||
new ArrayList<ObjectPermissionModel>(IMPLICIT_OBJECT_PERMISSIONS.length);
|
|
||||||
|
|
||||||
UserModel userModel = user.getUser().getModel();
|
|
||||||
for (ObjectPermission.Type permission : IMPLICIT_OBJECT_PERMISSIONS) {
|
|
||||||
|
|
||||||
// Create model which grants this permission to the current user
|
|
||||||
ObjectPermissionModel permissionModel = new ObjectPermissionModel();
|
|
||||||
permissionModel.setUserID(userModel.getObjectID());
|
|
||||||
permissionModel.setUsername(userModel.getIdentifier());
|
|
||||||
permissionModel.setType(permission);
|
|
||||||
permissionModel.setObjectIdentifier(model.getIdentifier());
|
|
||||||
|
|
||||||
// Add permission
|
|
||||||
implicitPermissions.add(permissionModel);
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
return implicitPermissions;
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Creates the given object within the database. If the object already
|
|
||||||
* exists, an error will be thrown. The internal model object will be
|
|
||||||
* updated appropriately to contain the new database ID.
|
|
||||||
*
|
*
|
||||||
* @param user
|
* @param user
|
||||||
* The user creating the object.
|
* The user creating the object.
|
||||||
@@ -422,21 +100,8 @@ public abstract class DirectoryObjectService<InternalType extends DirectoryObjec
|
|||||||
* If the user lacks permission to create the object, or an error
|
* If the user lacks permission to create the object, or an error
|
||||||
* occurs while creating the object.
|
* occurs while creating the object.
|
||||||
*/
|
*/
|
||||||
public InternalType createObject(AuthenticatedUser user, ExternalType object)
|
InternalType createObject(AuthenticatedUser user, ExternalType object)
|
||||||
throws GuacamoleException {
|
throws GuacamoleException;
|
||||||
|
|
||||||
ModelType model = getModelInstance(user, object);
|
|
||||||
beforeCreate(user, model);
|
|
||||||
|
|
||||||
// Create object
|
|
||||||
getObjectMapper().insert(model);
|
|
||||||
|
|
||||||
// Add implicit permissions
|
|
||||||
getPermissionMapper().insert(getImplicitPermissions(user, model));
|
|
||||||
|
|
||||||
return getObjectInstance(user, model);
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Deletes the object having the given identifier. If no such object
|
* Deletes the object having the given identifier. If no such object
|
||||||
@@ -452,19 +117,12 @@ public abstract class DirectoryObjectService<InternalType extends DirectoryObjec
|
|||||||
* If the user lacks permission to delete the object, or an error
|
* If the user lacks permission to delete the object, or an error
|
||||||
* occurs while deleting the object.
|
* occurs while deleting the object.
|
||||||
*/
|
*/
|
||||||
public void deleteObject(AuthenticatedUser user, String identifier)
|
void deleteObject(AuthenticatedUser user, String identifier)
|
||||||
throws GuacamoleException {
|
throws GuacamoleException;
|
||||||
|
|
||||||
beforeDelete(user, identifier);
|
|
||||||
|
|
||||||
// Delete object
|
|
||||||
getObjectMapper().delete(identifier);
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Updates the given object in the database, applying any changes that have
|
* Updates the given object, applying any changes that have been made. If
|
||||||
* been made. If no such object exists, this function has no effect.
|
* no such object exists, this function has no effect.
|
||||||
*
|
*
|
||||||
* @param user
|
* @param user
|
||||||
* The user updating the object.
|
* The user updating the object.
|
||||||
@@ -476,41 +134,22 @@ public abstract class DirectoryObjectService<InternalType extends DirectoryObjec
|
|||||||
* If the user lacks permission to update the object, or an error
|
* If the user lacks permission to update the object, or an error
|
||||||
* occurs while updating the object.
|
* occurs while updating the object.
|
||||||
*/
|
*/
|
||||||
public void updateObject(AuthenticatedUser user, InternalType object)
|
void updateObject(AuthenticatedUser user, InternalType object)
|
||||||
throws GuacamoleException {
|
throws GuacamoleException;
|
||||||
|
|
||||||
ModelType model = object.getModel();
|
|
||||||
beforeUpdate(user, model);
|
|
||||||
|
|
||||||
// Update object
|
|
||||||
getObjectMapper().update(model);
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns the set of all identifiers for all objects in the database that
|
* Returns the set of all identifiers for all objects that the user has
|
||||||
* the user has read access to.
|
* read access to.
|
||||||
*
|
*
|
||||||
* @param user
|
* @param user
|
||||||
* The user retrieving the identifiers.
|
* The user retrieving the identifiers.
|
||||||
*
|
*
|
||||||
* @return
|
* @return
|
||||||
* The set of all identifiers for all objects in the database.
|
* The set of all identifiers for all objects.
|
||||||
*
|
*
|
||||||
* @throws GuacamoleException
|
* @throws GuacamoleException
|
||||||
* If an error occurs while reading identifiers.
|
* If an error occurs while reading identifiers.
|
||||||
*/
|
*/
|
||||||
public Set<String> getIdentifiers(AuthenticatedUser user)
|
Set<String> getIdentifiers(AuthenticatedUser user) throws GuacamoleException;
|
||||||
throws GuacamoleException {
|
|
||||||
|
|
||||||
// Bypass permission checks if the user is a system admin
|
|
||||||
if (user.getUser().isAdministrator())
|
|
||||||
return getObjectMapper().selectIdentifiers();
|
|
||||||
|
|
||||||
// Otherwise only return explicitly readable identifiers
|
|
||||||
else
|
|
||||||
return getObjectMapper().selectReadableIdentifiers(user.getUser().getModel());
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
}
|
||||||
|
@@ -26,14 +26,15 @@ import org.glyptodon.guacamole.net.auth.Identifiable;
|
|||||||
|
|
||||||
/**
|
/**
|
||||||
* Common base class for objects that will ultimately be made available through
|
* Common base class for objects that will ultimately be made available through
|
||||||
* the Directory class. All such objects will need the same base set of queries
|
* the Directory class and are persisted to an underlying database model. All
|
||||||
* to fulfill the needs of the Directory class.
|
* such objects will need the same base set of queries to fulfill the needs of
|
||||||
|
* the Directory class.
|
||||||
*
|
*
|
||||||
* @author Michael Jumper
|
* @author Michael Jumper
|
||||||
* @param <ModelType>
|
* @param <ModelType>
|
||||||
* The type of model object that corresponds to this object.
|
* The type of model object that corresponds to this object.
|
||||||
*/
|
*/
|
||||||
public abstract class DirectoryObject<ModelType extends ObjectModel>
|
public abstract class ModeledDirectoryObject<ModelType extends ObjectModel>
|
||||||
extends ModeledObject<ModelType> implements Identifiable {
|
extends ModeledObject<ModelType> implements Identifiable {
|
||||||
|
|
||||||
@Override
|
@Override
|
@@ -37,7 +37,7 @@ import org.apache.ibatis.annotations.Param;
|
|||||||
* The type of object contained within the directory whose objects are
|
* The type of object contained within the directory whose objects are
|
||||||
* mapped by this mapper.
|
* mapped by this mapper.
|
||||||
*/
|
*/
|
||||||
public interface DirectoryObjectMapper<ModelType> {
|
public interface ModeledDirectoryObjectMapper<ModelType> {
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Selects the identifiers of all objects, regardless of whether they
|
* Selects the identifiers of all objects, regardless of whether they
|
@@ -0,0 +1,431 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (C) 2013 Glyptodon LLC
|
||||||
|
*
|
||||||
|
* Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
* of this software and associated documentation files (the "Software"), to deal
|
||||||
|
* in the Software without restriction, including without limitation the rights
|
||||||
|
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
||||||
|
* copies of the Software, and to permit persons to whom the Software is
|
||||||
|
* furnished to do so, subject to the following conditions:
|
||||||
|
*
|
||||||
|
* The above copyright notice and this permission notice shall be included in
|
||||||
|
* all copies or substantial portions of the Software.
|
||||||
|
*
|
||||||
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
||||||
|
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
||||||
|
* THE SOFTWARE.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package org.glyptodon.guacamole.auth.jdbc.base;
|
||||||
|
|
||||||
|
import java.util.ArrayList;
|
||||||
|
import java.util.Collection;
|
||||||
|
import java.util.Collections;
|
||||||
|
import java.util.Set;
|
||||||
|
import org.glyptodon.guacamole.auth.jdbc.user.AuthenticatedUser;
|
||||||
|
import org.glyptodon.guacamole.GuacamoleException;
|
||||||
|
import org.glyptodon.guacamole.GuacamoleSecurityException;
|
||||||
|
import org.glyptodon.guacamole.auth.jdbc.permission.ObjectPermissionMapper;
|
||||||
|
import org.glyptodon.guacamole.auth.jdbc.permission.ObjectPermissionModel;
|
||||||
|
import org.glyptodon.guacamole.auth.jdbc.user.UserModel;
|
||||||
|
import org.glyptodon.guacamole.net.auth.permission.ObjectPermission;
|
||||||
|
import org.glyptodon.guacamole.net.auth.permission.ObjectPermissionSet;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Service which provides convenience methods for creating, retrieving, and
|
||||||
|
* manipulating objects within directories. This service will automatically
|
||||||
|
* enforce the permissions of the current user.
|
||||||
|
*
|
||||||
|
* @author Michael Jumper
|
||||||
|
* @param <InternalType>
|
||||||
|
* The specific internal implementation of the type of object this service
|
||||||
|
* provides access to.
|
||||||
|
*
|
||||||
|
* @param <ExternalType>
|
||||||
|
* The external interface or implementation of the type of object this
|
||||||
|
* service provides access to, as defined by the guacamole-ext API.
|
||||||
|
*
|
||||||
|
* @param <ModelType>
|
||||||
|
* The underlying model object used to represent InternalType in the
|
||||||
|
* database.
|
||||||
|
*/
|
||||||
|
public abstract class ModeledDirectoryObjectService<InternalType extends ModeledDirectoryObject<ModelType>,
|
||||||
|
ExternalType, ModelType extends ObjectModel>
|
||||||
|
implements DirectoryObjectService<InternalType, ExternalType> {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* All object permissions which are implicitly granted upon creation to the
|
||||||
|
* creator of the object.
|
||||||
|
*/
|
||||||
|
private static final ObjectPermission.Type[] IMPLICIT_OBJECT_PERMISSIONS = {
|
||||||
|
ObjectPermission.Type.READ,
|
||||||
|
ObjectPermission.Type.UPDATE,
|
||||||
|
ObjectPermission.Type.DELETE,
|
||||||
|
ObjectPermission.Type.ADMINISTER
|
||||||
|
};
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns an instance of a mapper for the type of object used by this
|
||||||
|
* service.
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
* A mapper which provides access to the model objects associated with
|
||||||
|
* the objects used by this service.
|
||||||
|
*/
|
||||||
|
protected abstract ModeledDirectoryObjectMapper<ModelType> getObjectMapper();
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns an instance of a mapper for the type of permissions that affect
|
||||||
|
* the type of object used by this service.
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
* A mapper which provides access to the model objects associated with
|
||||||
|
* the permissions that affect the objects used by this service.
|
||||||
|
*/
|
||||||
|
protected abstract ObjectPermissionMapper getPermissionMapper();
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns an instance of an object which is backed by the given model
|
||||||
|
* object.
|
||||||
|
*
|
||||||
|
* @param currentUser
|
||||||
|
* The user for whom this object is being created.
|
||||||
|
*
|
||||||
|
* @param model
|
||||||
|
* The model object to use to back the returned object.
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
* An object which is backed by the given model object.
|
||||||
|
*/
|
||||||
|
protected abstract InternalType getObjectInstance(AuthenticatedUser currentUser,
|
||||||
|
ModelType model);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns an instance of a model object which is based on the given
|
||||||
|
* object.
|
||||||
|
*
|
||||||
|
* @param currentUser
|
||||||
|
* The user for whom this model object is being created.
|
||||||
|
*
|
||||||
|
* @param object
|
||||||
|
* The object to use to produce the returned model object.
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
* A model object which is based on the given object.
|
||||||
|
*/
|
||||||
|
protected abstract ModelType getModelInstance(AuthenticatedUser currentUser,
|
||||||
|
ExternalType object);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns whether the given user has permission to create the type of
|
||||||
|
* objects that this directory object service manages.
|
||||||
|
*
|
||||||
|
* @param user
|
||||||
|
* The user being checked.
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
* true if the user has object creation permission relevant to this
|
||||||
|
* directory object service, false otherwise.
|
||||||
|
*
|
||||||
|
* @throws GuacamoleException
|
||||||
|
* If permission to read the user's permissions is denied.
|
||||||
|
*/
|
||||||
|
protected abstract boolean hasCreatePermission(AuthenticatedUser user)
|
||||||
|
throws GuacamoleException;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns whether the given user has permission to perform a certain
|
||||||
|
* action on a specific object managed by this directory object service.
|
||||||
|
*
|
||||||
|
* @param user
|
||||||
|
* The user being checked.
|
||||||
|
*
|
||||||
|
* @param identifier
|
||||||
|
* The identifier of the object to check.
|
||||||
|
*
|
||||||
|
* @param type
|
||||||
|
* The type of action that will be performed.
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
* true if the user has object permission relevant described, false
|
||||||
|
* otherwise.
|
||||||
|
*
|
||||||
|
* @throws GuacamoleException
|
||||||
|
* If permission to read the user's permissions is denied.
|
||||||
|
*/
|
||||||
|
protected boolean hasObjectPermission(AuthenticatedUser user,
|
||||||
|
String identifier, ObjectPermission.Type type)
|
||||||
|
throws GuacamoleException {
|
||||||
|
|
||||||
|
// Get object permissions
|
||||||
|
ObjectPermissionSet permissionSet = getPermissionSet(user);
|
||||||
|
|
||||||
|
// Return whether permission is granted
|
||||||
|
return user.getUser().isAdministrator()
|
||||||
|
|| permissionSet.hasPermission(type, identifier);
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns the permission set associated with the given user and related
|
||||||
|
* to the type of objects handled by this directory object service.
|
||||||
|
*
|
||||||
|
* @param user
|
||||||
|
* The user whose permissions are being retrieved.
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
* A permission set which contains the permissions associated with the
|
||||||
|
* given user and related to the type of objects handled by this
|
||||||
|
* directory object service.
|
||||||
|
*
|
||||||
|
* @throws GuacamoleException
|
||||||
|
* If permission to read the user's permissions is denied.
|
||||||
|
*/
|
||||||
|
protected abstract ObjectPermissionSet getPermissionSet(AuthenticatedUser user)
|
||||||
|
throws GuacamoleException;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns a collection of objects which are backed by the models in the
|
||||||
|
* given collection.
|
||||||
|
*
|
||||||
|
* @param currentUser
|
||||||
|
* The user for whom these objects are being created.
|
||||||
|
*
|
||||||
|
* @param models
|
||||||
|
* The model objects to use to back the objects within the returned
|
||||||
|
* collection.
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
* A collection of objects which are backed by the models in the given
|
||||||
|
* collection.
|
||||||
|
*/
|
||||||
|
protected Collection<InternalType> getObjectInstances(AuthenticatedUser currentUser,
|
||||||
|
Collection<ModelType> models) {
|
||||||
|
|
||||||
|
// Create new collection of objects by manually converting each model
|
||||||
|
Collection<InternalType> objects = new ArrayList<InternalType>(models.size());
|
||||||
|
for (ModelType model : models)
|
||||||
|
objects.add(getObjectInstance(currentUser, model));
|
||||||
|
|
||||||
|
return objects;
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Called before any object is created through this directory object
|
||||||
|
* service. This function serves as a final point of validation before
|
||||||
|
* the create operation occurs. In its default implementation,
|
||||||
|
* beforeCreate() performs basic permissions checks.
|
||||||
|
*
|
||||||
|
* @param user
|
||||||
|
* The user creating the object.
|
||||||
|
*
|
||||||
|
* @param model
|
||||||
|
* The model of the object being created.
|
||||||
|
*
|
||||||
|
* @throws GuacamoleException
|
||||||
|
* If the object is invalid, or an error prevents validating the given
|
||||||
|
* object.
|
||||||
|
*/
|
||||||
|
protected void beforeCreate(AuthenticatedUser user,
|
||||||
|
ModelType model ) throws GuacamoleException {
|
||||||
|
|
||||||
|
// Verify permission to create objects
|
||||||
|
if (!user.getUser().isAdministrator() && !hasCreatePermission(user))
|
||||||
|
throw new GuacamoleSecurityException("Permission denied.");
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Called before any object is updated through this directory object
|
||||||
|
* service. This function serves as a final point of validation before
|
||||||
|
* the update operation occurs. In its default implementation,
|
||||||
|
* beforeUpdate() performs basic permissions checks.
|
||||||
|
*
|
||||||
|
* @param user
|
||||||
|
* The user updating the existing object.
|
||||||
|
*
|
||||||
|
* @param model
|
||||||
|
* The model of the object being updated.
|
||||||
|
*
|
||||||
|
* @throws GuacamoleException
|
||||||
|
* If the object is invalid, or an error prevents validating the given
|
||||||
|
* object.
|
||||||
|
*/
|
||||||
|
protected void beforeUpdate(AuthenticatedUser user,
|
||||||
|
ModelType model) throws GuacamoleException {
|
||||||
|
|
||||||
|
// By default, do nothing.
|
||||||
|
if (!hasObjectPermission(user, model.getIdentifier(), ObjectPermission.Type.UPDATE))
|
||||||
|
throw new GuacamoleSecurityException("Permission denied.");
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Called before any object is deleted through this directory object
|
||||||
|
* service. This function serves as a final point of validation before
|
||||||
|
* the delete operation occurs. In its default implementation,
|
||||||
|
* beforeDelete() performs basic permissions checks.
|
||||||
|
*
|
||||||
|
* @param user
|
||||||
|
* The user deleting the existing object.
|
||||||
|
*
|
||||||
|
* @param identifier
|
||||||
|
* The identifier of the object being deleted.
|
||||||
|
*
|
||||||
|
* @throws GuacamoleException
|
||||||
|
* If the object is invalid, or an error prevents validating the given
|
||||||
|
* object.
|
||||||
|
*/
|
||||||
|
protected void beforeDelete(AuthenticatedUser user,
|
||||||
|
String identifier) throws GuacamoleException {
|
||||||
|
|
||||||
|
// Verify permission to delete objects
|
||||||
|
if (!hasObjectPermission(user, identifier, ObjectPermission.Type.DELETE))
|
||||||
|
throw new GuacamoleSecurityException("Permission denied.");
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public InternalType retrieveObject(AuthenticatedUser user,
|
||||||
|
String identifier) throws GuacamoleException {
|
||||||
|
|
||||||
|
// Pull objects having given identifier
|
||||||
|
Collection<InternalType> objects = retrieveObjects(user, Collections.singleton(identifier));
|
||||||
|
|
||||||
|
// If no such object, return null
|
||||||
|
if (objects.isEmpty())
|
||||||
|
return null;
|
||||||
|
|
||||||
|
// The object collection will have exactly one element unless the
|
||||||
|
// database has seriously lost integrity
|
||||||
|
assert(objects.size() == 1);
|
||||||
|
|
||||||
|
// Return first and only object
|
||||||
|
return objects.iterator().next();
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Collection<InternalType> retrieveObjects(AuthenticatedUser user,
|
||||||
|
Collection<String> identifiers) throws GuacamoleException {
|
||||||
|
|
||||||
|
// Do not query if no identifiers given
|
||||||
|
if (identifiers.isEmpty())
|
||||||
|
return Collections.EMPTY_LIST;
|
||||||
|
|
||||||
|
Collection<ModelType> objects;
|
||||||
|
|
||||||
|
// Bypass permission checks if the user is a system admin
|
||||||
|
if (user.getUser().isAdministrator())
|
||||||
|
objects = getObjectMapper().select(identifiers);
|
||||||
|
|
||||||
|
// Otherwise only return explicitly readable identifiers
|
||||||
|
else
|
||||||
|
objects = getObjectMapper().selectReadable(user.getUser().getModel(), identifiers);
|
||||||
|
|
||||||
|
// Return collection of requested objects
|
||||||
|
return getObjectInstances(user, objects);
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns a collection of permissions that should be granted due to the
|
||||||
|
* creation of the given object. These permissions need not be granted
|
||||||
|
* solely to the user creating the object.
|
||||||
|
*
|
||||||
|
* @param user
|
||||||
|
* The user creating the object.
|
||||||
|
*
|
||||||
|
* @param model
|
||||||
|
* The object being created.
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
* The collection of implicit permissions that should be granted due to
|
||||||
|
* the creation of the given object.
|
||||||
|
*/
|
||||||
|
protected Collection<ObjectPermissionModel> getImplicitPermissions(AuthenticatedUser user,
|
||||||
|
ModelType model) {
|
||||||
|
|
||||||
|
// Build list of implicit permissions
|
||||||
|
Collection<ObjectPermissionModel> implicitPermissions =
|
||||||
|
new ArrayList<ObjectPermissionModel>(IMPLICIT_OBJECT_PERMISSIONS.length);
|
||||||
|
|
||||||
|
UserModel userModel = user.getUser().getModel();
|
||||||
|
for (ObjectPermission.Type permission : IMPLICIT_OBJECT_PERMISSIONS) {
|
||||||
|
|
||||||
|
// Create model which grants this permission to the current user
|
||||||
|
ObjectPermissionModel permissionModel = new ObjectPermissionModel();
|
||||||
|
permissionModel.setUserID(userModel.getObjectID());
|
||||||
|
permissionModel.setUsername(userModel.getIdentifier());
|
||||||
|
permissionModel.setType(permission);
|
||||||
|
permissionModel.setObjectIdentifier(model.getIdentifier());
|
||||||
|
|
||||||
|
// Add permission
|
||||||
|
implicitPermissions.add(permissionModel);
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
return implicitPermissions;
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public InternalType createObject(AuthenticatedUser user, ExternalType object)
|
||||||
|
throws GuacamoleException {
|
||||||
|
|
||||||
|
ModelType model = getModelInstance(user, object);
|
||||||
|
beforeCreate(user, model);
|
||||||
|
|
||||||
|
// Create object
|
||||||
|
getObjectMapper().insert(model);
|
||||||
|
|
||||||
|
// Add implicit permissions
|
||||||
|
getPermissionMapper().insert(getImplicitPermissions(user, model));
|
||||||
|
|
||||||
|
return getObjectInstance(user, model);
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void deleteObject(AuthenticatedUser user, String identifier)
|
||||||
|
throws GuacamoleException {
|
||||||
|
|
||||||
|
beforeDelete(user, identifier);
|
||||||
|
|
||||||
|
// Delete object
|
||||||
|
getObjectMapper().delete(identifier);
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void updateObject(AuthenticatedUser user, InternalType object)
|
||||||
|
throws GuacamoleException {
|
||||||
|
|
||||||
|
ModelType model = object.getModel();
|
||||||
|
beforeUpdate(user, model);
|
||||||
|
|
||||||
|
// Update object
|
||||||
|
getObjectMapper().update(model);
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Set<String> getIdentifiers(AuthenticatedUser user)
|
||||||
|
throws GuacamoleException {
|
||||||
|
|
||||||
|
// Bypass permission checks if the user is a system admin
|
||||||
|
if (user.getUser().isAdministrator())
|
||||||
|
return getObjectMapper().selectIdentifiers();
|
||||||
|
|
||||||
|
// Otherwise only return explicitly readable identifiers
|
||||||
|
else
|
||||||
|
return getObjectMapper().selectReadableIdentifiers(user.getUser().getModel());
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
@@ -33,8 +33,8 @@ import org.glyptodon.guacamole.auth.jdbc.connectiongroup.RootConnectionGroup;
|
|||||||
* @param <ModelType>
|
* @param <ModelType>
|
||||||
* The type of model object that corresponds to this object.
|
* The type of model object that corresponds to this object.
|
||||||
*/
|
*/
|
||||||
public abstract class GroupedDirectoryObject<ModelType extends GroupedObjectModel>
|
public abstract class ModeledGroupedDirectoryObject<ModelType extends GroupedObjectModel>
|
||||||
extends DirectoryObject<ModelType> {
|
extends ModeledDirectoryObject<ModelType> {
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns the identifier of the parent connection group, which cannot be
|
* Returns the identifier of the parent connection group, which cannot be
|
@@ -49,9 +49,9 @@ import org.glyptodon.guacamole.net.auth.permission.ObjectPermissionSet;
|
|||||||
* The underlying model object used to represent InternalType in the
|
* The underlying model object used to represent InternalType in the
|
||||||
* database.
|
* database.
|
||||||
*/
|
*/
|
||||||
public abstract class GroupedDirectoryObjectService<InternalType extends GroupedDirectoryObject<ModelType>,
|
public abstract class ModeledGroupedDirectoryObjectService<InternalType extends ModeledGroupedDirectoryObject<ModelType>,
|
||||||
ExternalType, ModelType extends GroupedObjectModel>
|
ExternalType, ModelType extends GroupedObjectModel>
|
||||||
extends DirectoryObjectService<InternalType, ExternalType, ModelType> {
|
extends ModeledDirectoryObjectService<InternalType, ExternalType, ModelType> {
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns the set of parent connection groups that are modified by the
|
* Returns the set of parent connection groups that are modified by the
|
@@ -23,7 +23,7 @@
|
|||||||
package org.glyptodon.guacamole.auth.jdbc.connection;
|
package org.glyptodon.guacamole.auth.jdbc.connection;
|
||||||
|
|
||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
import org.glyptodon.guacamole.auth.jdbc.base.DirectoryObjectMapper;
|
import org.glyptodon.guacamole.auth.jdbc.base.ModeledDirectoryObjectMapper;
|
||||||
import org.glyptodon.guacamole.auth.jdbc.user.UserModel;
|
import org.glyptodon.guacamole.auth.jdbc.user.UserModel;
|
||||||
import org.apache.ibatis.annotations.Param;
|
import org.apache.ibatis.annotations.Param;
|
||||||
|
|
||||||
@@ -32,7 +32,7 @@ import org.apache.ibatis.annotations.Param;
|
|||||||
*
|
*
|
||||||
* @author Michael Jumper
|
* @author Michael Jumper
|
||||||
*/
|
*/
|
||||||
public interface ConnectionMapper extends DirectoryObjectMapper<ConnectionModel> {
|
public interface ConnectionMapper extends ModeledDirectoryObjectMapper<ConnectionModel> {
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Selects the identifiers of all connections within the given parent
|
* Selects the identifiers of all connections within the given parent
|
||||||
|
@@ -32,12 +32,12 @@ import java.util.List;
|
|||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
import org.glyptodon.guacamole.auth.jdbc.user.AuthenticatedUser;
|
import org.glyptodon.guacamole.auth.jdbc.user.AuthenticatedUser;
|
||||||
import org.glyptodon.guacamole.auth.jdbc.base.DirectoryObjectMapper;
|
import org.glyptodon.guacamole.auth.jdbc.base.ModeledDirectoryObjectMapper;
|
||||||
import org.glyptodon.guacamole.auth.jdbc.tunnel.GuacamoleTunnelService;
|
import org.glyptodon.guacamole.auth.jdbc.tunnel.GuacamoleTunnelService;
|
||||||
import org.glyptodon.guacamole.GuacamoleClientException;
|
import org.glyptodon.guacamole.GuacamoleClientException;
|
||||||
import org.glyptodon.guacamole.GuacamoleException;
|
import org.glyptodon.guacamole.GuacamoleException;
|
||||||
import org.glyptodon.guacamole.GuacamoleSecurityException;
|
import org.glyptodon.guacamole.GuacamoleSecurityException;
|
||||||
import org.glyptodon.guacamole.auth.jdbc.base.GroupedDirectoryObjectService;
|
import org.glyptodon.guacamole.auth.jdbc.base.ModeledGroupedDirectoryObjectService;
|
||||||
import org.glyptodon.guacamole.auth.jdbc.permission.ConnectionPermissionMapper;
|
import org.glyptodon.guacamole.auth.jdbc.permission.ConnectionPermissionMapper;
|
||||||
import org.glyptodon.guacamole.auth.jdbc.permission.ObjectPermissionMapper;
|
import org.glyptodon.guacamole.auth.jdbc.permission.ObjectPermissionMapper;
|
||||||
import org.glyptodon.guacamole.net.GuacamoleTunnel;
|
import org.glyptodon.guacamole.net.GuacamoleTunnel;
|
||||||
@@ -55,7 +55,7 @@ import org.glyptodon.guacamole.protocol.GuacamoleClientInformation;
|
|||||||
*
|
*
|
||||||
* @author Michael Jumper, James Muehlner
|
* @author Michael Jumper, James Muehlner
|
||||||
*/
|
*/
|
||||||
public class ConnectionService extends GroupedDirectoryObjectService<ModeledConnection, Connection, ConnectionModel> {
|
public class ConnectionService extends ModeledGroupedDirectoryObjectService<ModeledConnection, Connection, ConnectionModel> {
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Mapper for accessing connections.
|
* Mapper for accessing connections.
|
||||||
@@ -94,7 +94,7 @@ public class ConnectionService extends GroupedDirectoryObjectService<ModeledConn
|
|||||||
private GuacamoleTunnelService tunnelService;
|
private GuacamoleTunnelService tunnelService;
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
protected DirectoryObjectMapper<ConnectionModel> getObjectMapper() {
|
protected ModeledDirectoryObjectMapper<ConnectionModel> getObjectMapper() {
|
||||||
return connectionMapper;
|
return connectionMapper;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -27,7 +27,7 @@ import com.google.inject.Provider;
|
|||||||
import java.util.List;
|
import java.util.List;
|
||||||
import org.glyptodon.guacamole.auth.jdbc.tunnel.GuacamoleTunnelService;
|
import org.glyptodon.guacamole.auth.jdbc.tunnel.GuacamoleTunnelService;
|
||||||
import org.glyptodon.guacamole.GuacamoleException;
|
import org.glyptodon.guacamole.GuacamoleException;
|
||||||
import org.glyptodon.guacamole.auth.jdbc.base.GroupedDirectoryObject;
|
import org.glyptodon.guacamole.auth.jdbc.base.ModeledGroupedDirectoryObject;
|
||||||
import org.glyptodon.guacamole.net.GuacamoleTunnel;
|
import org.glyptodon.guacamole.net.GuacamoleTunnel;
|
||||||
import org.glyptodon.guacamole.net.auth.Connection;
|
import org.glyptodon.guacamole.net.auth.Connection;
|
||||||
import org.glyptodon.guacamole.net.auth.ConnectionRecord;
|
import org.glyptodon.guacamole.net.auth.ConnectionRecord;
|
||||||
@@ -41,7 +41,7 @@ import org.glyptodon.guacamole.protocol.GuacamoleConfiguration;
|
|||||||
* @author James Muehlner
|
* @author James Muehlner
|
||||||
* @author Michael Jumper
|
* @author Michael Jumper
|
||||||
*/
|
*/
|
||||||
public class ModeledConnection extends GroupedDirectoryObject<ConnectionModel>
|
public class ModeledConnection extends ModeledGroupedDirectoryObject<ConnectionModel>
|
||||||
implements Connection {
|
implements Connection {
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@@ -24,7 +24,6 @@ package org.glyptodon.guacamole.auth.jdbc.connection;
|
|||||||
|
|
||||||
|
|
||||||
import java.util.Date;
|
import java.util.Date;
|
||||||
import org.glyptodon.guacamole.net.GuacamoleTunnel;
|
|
||||||
import org.glyptodon.guacamole.net.auth.ConnectionRecord;
|
import org.glyptodon.guacamole.net.auth.ConnectionRecord;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -52,11 +51,6 @@ public class ModeledConnectionRecord implements ConnectionRecord {
|
|||||||
this.model = model;
|
this.model = model;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
|
||||||
public String getIdentifier() {
|
|
||||||
return model.getConnectionIdentifier();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public Date getStartDate() {
|
public Date getStartDate() {
|
||||||
return model.getStartDate();
|
return model.getStartDate();
|
||||||
@@ -82,9 +76,4 @@ public class ModeledConnectionRecord implements ConnectionRecord {
|
|||||||
return false;
|
return false;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
|
||||||
public GuacamoleTunnel getTunnel() {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
}
|
||||||
|
@@ -23,7 +23,7 @@
|
|||||||
package org.glyptodon.guacamole.auth.jdbc.connectiongroup;
|
package org.glyptodon.guacamole.auth.jdbc.connectiongroup;
|
||||||
|
|
||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
import org.glyptodon.guacamole.auth.jdbc.base.DirectoryObjectMapper;
|
import org.glyptodon.guacamole.auth.jdbc.base.ModeledDirectoryObjectMapper;
|
||||||
import org.glyptodon.guacamole.auth.jdbc.user.UserModel;
|
import org.glyptodon.guacamole.auth.jdbc.user.UserModel;
|
||||||
import org.apache.ibatis.annotations.Param;
|
import org.apache.ibatis.annotations.Param;
|
||||||
|
|
||||||
@@ -32,7 +32,7 @@ import org.apache.ibatis.annotations.Param;
|
|||||||
*
|
*
|
||||||
* @author Michael Jumper
|
* @author Michael Jumper
|
||||||
*/
|
*/
|
||||||
public interface ConnectionGroupMapper extends DirectoryObjectMapper<ConnectionGroupModel> {
|
public interface ConnectionGroupMapper extends ModeledDirectoryObjectMapper<ConnectionGroupModel> {
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Selects the identifiers of all connection groups within the given parent
|
* Selects the identifiers of all connection groups within the given parent
|
||||||
|
@@ -26,13 +26,13 @@ import com.google.inject.Inject;
|
|||||||
import com.google.inject.Provider;
|
import com.google.inject.Provider;
|
||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
import org.glyptodon.guacamole.auth.jdbc.user.AuthenticatedUser;
|
import org.glyptodon.guacamole.auth.jdbc.user.AuthenticatedUser;
|
||||||
import org.glyptodon.guacamole.auth.jdbc.base.DirectoryObjectMapper;
|
import org.glyptodon.guacamole.auth.jdbc.base.ModeledDirectoryObjectMapper;
|
||||||
import org.glyptodon.guacamole.auth.jdbc.tunnel.GuacamoleTunnelService;
|
import org.glyptodon.guacamole.auth.jdbc.tunnel.GuacamoleTunnelService;
|
||||||
import org.glyptodon.guacamole.GuacamoleClientException;
|
import org.glyptodon.guacamole.GuacamoleClientException;
|
||||||
import org.glyptodon.guacamole.GuacamoleException;
|
import org.glyptodon.guacamole.GuacamoleException;
|
||||||
import org.glyptodon.guacamole.GuacamoleSecurityException;
|
import org.glyptodon.guacamole.GuacamoleSecurityException;
|
||||||
import org.glyptodon.guacamole.GuacamoleUnsupportedException;
|
import org.glyptodon.guacamole.GuacamoleUnsupportedException;
|
||||||
import org.glyptodon.guacamole.auth.jdbc.base.GroupedDirectoryObjectService;
|
import org.glyptodon.guacamole.auth.jdbc.base.ModeledGroupedDirectoryObjectService;
|
||||||
import org.glyptodon.guacamole.auth.jdbc.permission.ConnectionGroupPermissionMapper;
|
import org.glyptodon.guacamole.auth.jdbc.permission.ConnectionGroupPermissionMapper;
|
||||||
import org.glyptodon.guacamole.auth.jdbc.permission.ObjectPermissionMapper;
|
import org.glyptodon.guacamole.auth.jdbc.permission.ObjectPermissionMapper;
|
||||||
import org.glyptodon.guacamole.net.GuacamoleTunnel;
|
import org.glyptodon.guacamole.net.GuacamoleTunnel;
|
||||||
@@ -49,7 +49,7 @@ import org.glyptodon.guacamole.protocol.GuacamoleClientInformation;
|
|||||||
*
|
*
|
||||||
* @author Michael Jumper, James Muehlner
|
* @author Michael Jumper, James Muehlner
|
||||||
*/
|
*/
|
||||||
public class ConnectionGroupService extends GroupedDirectoryObjectService<ModeledConnectionGroup,
|
public class ConnectionGroupService extends ModeledGroupedDirectoryObjectService<ModeledConnectionGroup,
|
||||||
ConnectionGroup, ConnectionGroupModel> {
|
ConnectionGroup, ConnectionGroupModel> {
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -77,7 +77,7 @@ public class ConnectionGroupService extends GroupedDirectoryObjectService<Modele
|
|||||||
private GuacamoleTunnelService tunnelService;
|
private GuacamoleTunnelService tunnelService;
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
protected DirectoryObjectMapper<ConnectionGroupModel> getObjectMapper() {
|
protected ModeledDirectoryObjectMapper<ConnectionGroupModel> getObjectMapper() {
|
||||||
return connectionGroupMapper;
|
return connectionGroupMapper;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -27,7 +27,7 @@ import java.util.Set;
|
|||||||
import org.glyptodon.guacamole.auth.jdbc.connection.ConnectionService;
|
import org.glyptodon.guacamole.auth.jdbc.connection.ConnectionService;
|
||||||
import org.glyptodon.guacamole.auth.jdbc.tunnel.GuacamoleTunnelService;
|
import org.glyptodon.guacamole.auth.jdbc.tunnel.GuacamoleTunnelService;
|
||||||
import org.glyptodon.guacamole.GuacamoleException;
|
import org.glyptodon.guacamole.GuacamoleException;
|
||||||
import org.glyptodon.guacamole.auth.jdbc.base.GroupedDirectoryObject;
|
import org.glyptodon.guacamole.auth.jdbc.base.ModeledGroupedDirectoryObject;
|
||||||
import org.glyptodon.guacamole.net.GuacamoleTunnel;
|
import org.glyptodon.guacamole.net.GuacamoleTunnel;
|
||||||
import org.glyptodon.guacamole.net.auth.ConnectionGroup;
|
import org.glyptodon.guacamole.net.auth.ConnectionGroup;
|
||||||
import org.glyptodon.guacamole.protocol.GuacamoleClientInformation;
|
import org.glyptodon.guacamole.protocol.GuacamoleClientInformation;
|
||||||
@@ -38,7 +38,7 @@ import org.glyptodon.guacamole.protocol.GuacamoleClientInformation;
|
|||||||
*
|
*
|
||||||
* @author James Muehlner
|
* @author James Muehlner
|
||||||
*/
|
*/
|
||||||
public class ModeledConnectionGroup extends GroupedDirectoryObject<ConnectionGroupModel>
|
public class ModeledConnectionGroup extends ModeledGroupedDirectoryObject<ConnectionGroupModel>
|
||||||
implements ConnectionGroup {
|
implements ConnectionGroup {
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
@@ -0,0 +1,84 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (C) 2015 Glyptodon LLC
|
||||||
|
*
|
||||||
|
* Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
* of this software and associated documentation files (the "Software"), to deal
|
||||||
|
* in the Software without restriction, including without limitation the rights
|
||||||
|
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
||||||
|
* copies of the Software, and to permit persons to whom the Software is
|
||||||
|
* furnished to do so, subject to the following conditions:
|
||||||
|
*
|
||||||
|
* The above copyright notice and this permission notice shall be included in
|
||||||
|
* all copies or substantial portions of the Software.
|
||||||
|
*
|
||||||
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
||||||
|
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
||||||
|
* THE SOFTWARE.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package org.glyptodon.guacamole.auth.jdbc.permission;
|
||||||
|
|
||||||
|
import org.glyptodon.guacamole.auth.jdbc.user.AuthenticatedUser;
|
||||||
|
import org.glyptodon.guacamole.auth.jdbc.user.ModeledUser;
|
||||||
|
import org.glyptodon.guacamole.GuacamoleException;
|
||||||
|
import org.glyptodon.guacamole.net.auth.permission.ObjectPermission;
|
||||||
|
import org.glyptodon.guacamole.net.auth.permission.ObjectPermissionSet;
|
||||||
|
import org.glyptodon.guacamole.net.auth.permission.Permission;
|
||||||
|
import org.glyptodon.guacamole.net.auth.permission.PermissionSet;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Abstract PermissionService implementation which provides additional
|
||||||
|
* convenience methods for enforcing the permission model.
|
||||||
|
*
|
||||||
|
* @author Michael Jumper
|
||||||
|
* @param <PermissionSetType>
|
||||||
|
* The type of permission sets this service provides access to.
|
||||||
|
*
|
||||||
|
* @param <PermissionType>
|
||||||
|
* The type of permission this service provides access to.
|
||||||
|
*/
|
||||||
|
public abstract class AbstractPermissionService<PermissionSetType extends PermissionSet<PermissionType>,
|
||||||
|
PermissionType extends Permission>
|
||||||
|
implements PermissionService<PermissionSetType, PermissionType> {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Determines whether the given user can read the permissions currently
|
||||||
|
* granted to the given target user. If the reading user and the target
|
||||||
|
* user are not the same, then explicit READ or SYSTEM_ADMINISTER access is
|
||||||
|
* required.
|
||||||
|
*
|
||||||
|
* @param user
|
||||||
|
* The user attempting to read permissions.
|
||||||
|
*
|
||||||
|
* @param targetUser
|
||||||
|
* The user whose permissions are being read.
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
* true if permission is granted, false otherwise.
|
||||||
|
*
|
||||||
|
* @throws GuacamoleException
|
||||||
|
* If an error occurs while checking permission status, or if
|
||||||
|
* permission is denied to read the current user's permissions.
|
||||||
|
*/
|
||||||
|
protected boolean canReadPermissions(AuthenticatedUser user,
|
||||||
|
ModeledUser targetUser) throws GuacamoleException {
|
||||||
|
|
||||||
|
// A user can always read their own permissions
|
||||||
|
if (user.getUser().getIdentifier().equals(targetUser.getIdentifier()))
|
||||||
|
return true;
|
||||||
|
|
||||||
|
// A system adminstrator can do anything
|
||||||
|
if (user.getUser().isAdministrator())
|
||||||
|
return true;
|
||||||
|
|
||||||
|
// Can read permissions on target user if explicit READ is granted
|
||||||
|
ObjectPermissionSet userPermissionSet = user.getUser().getUserPermissions();
|
||||||
|
return userPermissionSet.hasPermission(ObjectPermission.Type.READ, targetUser.getIdentifier());
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
@@ -35,7 +35,7 @@ import org.glyptodon.guacamole.auth.jdbc.user.ModeledUser;
|
|||||||
*
|
*
|
||||||
* @author Michael Jumper
|
* @author Michael Jumper
|
||||||
*/
|
*/
|
||||||
public class ConnectionGroupPermissionService extends ObjectPermissionService {
|
public class ConnectionGroupPermissionService extends ModeledObjectPermissionService {
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Mapper for connection group permissions.
|
* Mapper for connection group permissions.
|
||||||
|
@@ -35,7 +35,7 @@ import org.glyptodon.guacamole.auth.jdbc.user.ModeledUser;
|
|||||||
*
|
*
|
||||||
* @author Michael Jumper
|
* @author Michael Jumper
|
||||||
*/
|
*/
|
||||||
public class ConnectionPermissionService extends ObjectPermissionService {
|
public class ConnectionPermissionService extends ModeledObjectPermissionService {
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Mapper for connection permissions.
|
* Mapper for connection permissions.
|
||||||
|
@@ -0,0 +1,210 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (C) 2015 Glyptodon LLC
|
||||||
|
*
|
||||||
|
* Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
* of this software and associated documentation files (the "Software"), to deal
|
||||||
|
* in the Software without restriction, including without limitation the rights
|
||||||
|
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
||||||
|
* copies of the Software, and to permit persons to whom the Software is
|
||||||
|
* furnished to do so, subject to the following conditions:
|
||||||
|
*
|
||||||
|
* The above copyright notice and this permission notice shall be included in
|
||||||
|
* all copies or substantial portions of the Software.
|
||||||
|
*
|
||||||
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
||||||
|
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
||||||
|
* THE SOFTWARE.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package org.glyptodon.guacamole.auth.jdbc.permission;
|
||||||
|
|
||||||
|
import java.util.Collection;
|
||||||
|
import java.util.Collections;
|
||||||
|
import java.util.HashSet;
|
||||||
|
import org.glyptodon.guacamole.auth.jdbc.user.AuthenticatedUser;
|
||||||
|
import org.glyptodon.guacamole.auth.jdbc.user.ModeledUser;
|
||||||
|
import org.glyptodon.guacamole.GuacamoleException;
|
||||||
|
import org.glyptodon.guacamole.GuacamoleSecurityException;
|
||||||
|
import org.glyptodon.guacamole.net.auth.permission.ObjectPermission;
|
||||||
|
import org.glyptodon.guacamole.net.auth.permission.ObjectPermissionSet;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Service which provides convenience methods for creating, retrieving, and
|
||||||
|
* deleting object permissions within a backend database model. This service
|
||||||
|
* will automatically enforce the permissions of the current user.
|
||||||
|
*
|
||||||
|
* @author Michael Jumper
|
||||||
|
*/
|
||||||
|
public abstract class ModeledObjectPermissionService
|
||||||
|
extends ModeledPermissionService<ObjectPermissionSet, ObjectPermission, ObjectPermissionModel>
|
||||||
|
implements ObjectPermissionService {
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected abstract ObjectPermissionMapper getPermissionMapper();
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected ObjectPermission getPermissionInstance(ObjectPermissionModel model) {
|
||||||
|
return new ObjectPermission(model.getType(), model.getObjectIdentifier());
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
protected ObjectPermissionModel getModelInstance(ModeledUser targetUser,
|
||||||
|
ObjectPermission permission) {
|
||||||
|
|
||||||
|
ObjectPermissionModel model = new ObjectPermissionModel();
|
||||||
|
|
||||||
|
// Populate model object with data from user and permission
|
||||||
|
model.setUserID(targetUser.getModel().getObjectID());
|
||||||
|
model.setUsername(targetUser.getModel().getIdentifier());
|
||||||
|
model.setType(permission.getType());
|
||||||
|
model.setObjectIdentifier(permission.getObjectIdentifier());
|
||||||
|
|
||||||
|
return model;
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Determines whether the current user has permission to update the given
|
||||||
|
* target user, adding or removing the given permissions. Such permission
|
||||||
|
* depends on whether the current user is a system administrator, whether
|
||||||
|
* they have explicit UPDATE permission on the target user, and whether
|
||||||
|
* they have explicit ADMINISTER permission on all affected objects.
|
||||||
|
*
|
||||||
|
* @param user
|
||||||
|
* The user who is changing permissions.
|
||||||
|
*
|
||||||
|
* @param targetUser
|
||||||
|
* The user whose permissions are being changed.
|
||||||
|
*
|
||||||
|
* @param permissions
|
||||||
|
* The permissions that are being added or removed from the target
|
||||||
|
* user.
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
* true if the user has permission to change the target users
|
||||||
|
* permissions as specified, false otherwise.
|
||||||
|
*
|
||||||
|
* @throws GuacamoleException
|
||||||
|
* If an error occurs while checking permission status, or if
|
||||||
|
* permission is denied to read the current user's permissions.
|
||||||
|
*/
|
||||||
|
protected boolean canAlterPermissions(AuthenticatedUser user, ModeledUser targetUser,
|
||||||
|
Collection<ObjectPermission> permissions)
|
||||||
|
throws GuacamoleException {
|
||||||
|
|
||||||
|
// A system adminstrator can do anything
|
||||||
|
if (user.getUser().isAdministrator())
|
||||||
|
return true;
|
||||||
|
|
||||||
|
// Verify user has update permission on the target user
|
||||||
|
ObjectPermissionSet userPermissionSet = user.getUser().getUserPermissions();
|
||||||
|
if (!userPermissionSet.hasPermission(ObjectPermission.Type.UPDATE, targetUser.getIdentifier()))
|
||||||
|
return false;
|
||||||
|
|
||||||
|
// Produce collection of affected identifiers
|
||||||
|
Collection<String> affectedIdentifiers = new HashSet(permissions.size());
|
||||||
|
for (ObjectPermission permission : permissions)
|
||||||
|
affectedIdentifiers.add(permission.getObjectIdentifier());
|
||||||
|
|
||||||
|
// Determine subset of affected identifiers that we have admin access to
|
||||||
|
ObjectPermissionSet affectedPermissionSet = getPermissionSet(user, user.getUser());
|
||||||
|
Collection<String> allowedSubset = affectedPermissionSet.getAccessibleObjects(
|
||||||
|
Collections.singleton(ObjectPermission.Type.ADMINISTER),
|
||||||
|
affectedIdentifiers
|
||||||
|
);
|
||||||
|
|
||||||
|
// The permissions can be altered if and only if the set of objects we
|
||||||
|
// are allowed to administer is equal to the set of objects we will be
|
||||||
|
// affecting.
|
||||||
|
|
||||||
|
return affectedIdentifiers.size() == allowedSubset.size();
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void createPermissions(AuthenticatedUser user, ModeledUser targetUser,
|
||||||
|
Collection<ObjectPermission> permissions)
|
||||||
|
throws GuacamoleException {
|
||||||
|
|
||||||
|
// Create permissions only if user has permission to do so
|
||||||
|
if (canAlterPermissions(user, targetUser, permissions)) {
|
||||||
|
Collection<ObjectPermissionModel> models = getModelInstances(targetUser, permissions);
|
||||||
|
getPermissionMapper().insert(models);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
// User lacks permission to create object permissions
|
||||||
|
throw new GuacamoleSecurityException("Permission denied.");
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void deletePermissions(AuthenticatedUser user, ModeledUser targetUser,
|
||||||
|
Collection<ObjectPermission> permissions)
|
||||||
|
throws GuacamoleException {
|
||||||
|
|
||||||
|
// Delete permissions only if user has permission to do so
|
||||||
|
if (canAlterPermissions(user, targetUser, permissions)) {
|
||||||
|
Collection<ObjectPermissionModel> models = getModelInstances(targetUser, permissions);
|
||||||
|
getPermissionMapper().delete(models);
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
// User lacks permission to delete object permissions
|
||||||
|
throw new GuacamoleSecurityException("Permission denied.");
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public ObjectPermission retrievePermission(AuthenticatedUser user,
|
||||||
|
ModeledUser targetUser, ObjectPermission.Type type,
|
||||||
|
String identifier) throws GuacamoleException {
|
||||||
|
|
||||||
|
// Retrieve permissions only if allowed
|
||||||
|
if (canReadPermissions(user, targetUser)) {
|
||||||
|
|
||||||
|
// Read permission from database, return null if not found
|
||||||
|
ObjectPermissionModel model = getPermissionMapper().selectOne(targetUser.getModel(), type, identifier);
|
||||||
|
if (model == null)
|
||||||
|
return null;
|
||||||
|
|
||||||
|
return getPermissionInstance(model);
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
// User cannot read this user's permissions
|
||||||
|
throw new GuacamoleSecurityException("Permission denied.");
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Collection<String> retrieveAccessibleIdentifiers(AuthenticatedUser user,
|
||||||
|
ModeledUser targetUser, Collection<ObjectPermission.Type> permissions,
|
||||||
|
Collection<String> identifiers) throws GuacamoleException {
|
||||||
|
|
||||||
|
// Nothing is always accessible
|
||||||
|
if (identifiers.isEmpty())
|
||||||
|
return identifiers;
|
||||||
|
|
||||||
|
// Retrieve permissions only if allowed
|
||||||
|
if (canReadPermissions(user, targetUser)) {
|
||||||
|
|
||||||
|
// If user is an admin, everything is accessible
|
||||||
|
if (user.getUser().isAdministrator())
|
||||||
|
return identifiers;
|
||||||
|
|
||||||
|
// Otherwise, return explicitly-retrievable identifiers
|
||||||
|
return getPermissionMapper().selectAccessibleIdentifiers(targetUser.getModel(), permissions, identifiers);
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
// User cannot read this user's permissions
|
||||||
|
throw new GuacamoleSecurityException("Permission denied.");
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
@@ -0,0 +1,158 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (C) 2015 Glyptodon LLC
|
||||||
|
*
|
||||||
|
* Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
* of this software and associated documentation files (the "Software"), to deal
|
||||||
|
* in the Software without restriction, including without limitation the rights
|
||||||
|
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
||||||
|
* copies of the Software, and to permit persons to whom the Software is
|
||||||
|
* furnished to do so, subject to the following conditions:
|
||||||
|
*
|
||||||
|
* The above copyright notice and this permission notice shall be included in
|
||||||
|
* all copies or substantial portions of the Software.
|
||||||
|
*
|
||||||
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
||||||
|
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
||||||
|
* THE SOFTWARE.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package org.glyptodon.guacamole.auth.jdbc.permission;
|
||||||
|
|
||||||
|
import java.util.ArrayList;
|
||||||
|
import java.util.Collection;
|
||||||
|
import java.util.HashSet;
|
||||||
|
import java.util.Set;
|
||||||
|
import org.glyptodon.guacamole.auth.jdbc.user.AuthenticatedUser;
|
||||||
|
import org.glyptodon.guacamole.auth.jdbc.user.ModeledUser;
|
||||||
|
import org.glyptodon.guacamole.GuacamoleException;
|
||||||
|
import org.glyptodon.guacamole.GuacamoleSecurityException;
|
||||||
|
import org.glyptodon.guacamole.net.auth.permission.Permission;
|
||||||
|
import org.glyptodon.guacamole.net.auth.permission.PermissionSet;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Service which provides convenience methods for creating, retrieving, and
|
||||||
|
* deleting permissions within a backend database model, and for obtaining the
|
||||||
|
* permission sets that contain these permissions. This service will
|
||||||
|
* automatically enforce the permissions of the current user.
|
||||||
|
*
|
||||||
|
* @author Michael Jumper
|
||||||
|
* @param <PermissionSetType>
|
||||||
|
* The type of permission sets this service provides access to.
|
||||||
|
*
|
||||||
|
* @param <PermissionType>
|
||||||
|
* The type of permission this service provides access to.
|
||||||
|
*
|
||||||
|
* @param <ModelType>
|
||||||
|
* The underlying model object used to represent PermissionType in the
|
||||||
|
* database.
|
||||||
|
*/
|
||||||
|
public abstract class ModeledPermissionService<PermissionSetType extends PermissionSet<PermissionType>,
|
||||||
|
PermissionType extends Permission, ModelType>
|
||||||
|
extends AbstractPermissionService<PermissionSetType, PermissionType> {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns an instance of a mapper for the type of permission used by this
|
||||||
|
* service.
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
* A mapper which provides access to the model objects associated with
|
||||||
|
* the permissions used by this service.
|
||||||
|
*/
|
||||||
|
protected abstract PermissionMapper<ModelType> getPermissionMapper();
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns an instance of a permission which is based on the given model
|
||||||
|
* object.
|
||||||
|
*
|
||||||
|
* @param model
|
||||||
|
* The model object to use to produce the returned permission.
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
* A permission which is based on the given model object.
|
||||||
|
*/
|
||||||
|
protected abstract PermissionType getPermissionInstance(ModelType model);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns a collection of permissions which are based on the models in
|
||||||
|
* the given collection.
|
||||||
|
*
|
||||||
|
* @param models
|
||||||
|
* The model objects to use to produce the permissions within the
|
||||||
|
* returned set.
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
* A set of permissions which are based on the models in the given
|
||||||
|
* collection.
|
||||||
|
*/
|
||||||
|
protected Set<PermissionType> getPermissionInstances(Collection<ModelType> models) {
|
||||||
|
|
||||||
|
// Create new collection of permissions by manually converting each model
|
||||||
|
Set<PermissionType> permissions = new HashSet<PermissionType>(models.size());
|
||||||
|
for (ModelType model : models)
|
||||||
|
permissions.add(getPermissionInstance(model));
|
||||||
|
|
||||||
|
return permissions;
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns an instance of a model object which is based on the given
|
||||||
|
* permission and target user.
|
||||||
|
*
|
||||||
|
* @param targetUser
|
||||||
|
* The user to whom this permission is granted.
|
||||||
|
*
|
||||||
|
* @param permission
|
||||||
|
* The permission to use to produce the returned model object.
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
* A model object which is based on the given permission and target
|
||||||
|
* user.
|
||||||
|
*/
|
||||||
|
protected abstract ModelType getModelInstance(ModeledUser targetUser,
|
||||||
|
PermissionType permission);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns a collection of model objects which are based on the given
|
||||||
|
* permissions and target user.
|
||||||
|
*
|
||||||
|
* @param targetUser
|
||||||
|
* The user to whom this permission is granted.
|
||||||
|
*
|
||||||
|
* @param permissions
|
||||||
|
* The permissions to use to produce the returned model objects.
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
* A collection of model objects which are based on the given
|
||||||
|
* permissions and target user.
|
||||||
|
*/
|
||||||
|
protected Collection<ModelType> getModelInstances(ModeledUser targetUser,
|
||||||
|
Collection<PermissionType> permissions) {
|
||||||
|
|
||||||
|
// Create new collection of models by manually converting each permission
|
||||||
|
Collection<ModelType> models = new ArrayList<ModelType>(permissions.size());
|
||||||
|
for (PermissionType permission : permissions)
|
||||||
|
models.add(getModelInstance(targetUser, permission));
|
||||||
|
|
||||||
|
return models;
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Set<PermissionType> retrievePermissions(AuthenticatedUser user,
|
||||||
|
ModeledUser targetUser) throws GuacamoleException {
|
||||||
|
|
||||||
|
// Retrieve permissions only if allowed
|
||||||
|
if (canReadPermissions(user, targetUser))
|
||||||
|
return getPermissionInstances(getPermissionMapper().select(targetUser.getModel()));
|
||||||
|
|
||||||
|
// User cannot read this user's permissions
|
||||||
|
throw new GuacamoleSecurityException("Permission denied.");
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
@@ -23,12 +23,9 @@
|
|||||||
package org.glyptodon.guacamole.auth.jdbc.permission;
|
package org.glyptodon.guacamole.auth.jdbc.permission;
|
||||||
|
|
||||||
import java.util.Collection;
|
import java.util.Collection;
|
||||||
import java.util.Collections;
|
|
||||||
import java.util.HashSet;
|
|
||||||
import org.glyptodon.guacamole.auth.jdbc.user.AuthenticatedUser;
|
import org.glyptodon.guacamole.auth.jdbc.user.AuthenticatedUser;
|
||||||
import org.glyptodon.guacamole.auth.jdbc.user.ModeledUser;
|
import org.glyptodon.guacamole.auth.jdbc.user.ModeledUser;
|
||||||
import org.glyptodon.guacamole.GuacamoleException;
|
import org.glyptodon.guacamole.GuacamoleException;
|
||||||
import org.glyptodon.guacamole.GuacamoleSecurityException;
|
|
||||||
import org.glyptodon.guacamole.net.auth.permission.ObjectPermission;
|
import org.glyptodon.guacamole.net.auth.permission.ObjectPermission;
|
||||||
import org.glyptodon.guacamole.net.auth.permission.ObjectPermissionSet;
|
import org.glyptodon.guacamole.net.auth.permission.ObjectPermissionSet;
|
||||||
|
|
||||||
@@ -39,124 +36,8 @@ import org.glyptodon.guacamole.net.auth.permission.ObjectPermissionSet;
|
|||||||
*
|
*
|
||||||
* @author Michael Jumper
|
* @author Michael Jumper
|
||||||
*/
|
*/
|
||||||
public abstract class ObjectPermissionService
|
public interface ObjectPermissionService
|
||||||
extends PermissionService<ObjectPermissionSet, ObjectPermission, ObjectPermissionModel> {
|
extends PermissionService<ObjectPermissionSet, ObjectPermission> {
|
||||||
|
|
||||||
@Override
|
|
||||||
protected abstract ObjectPermissionMapper getPermissionMapper();
|
|
||||||
|
|
||||||
@Override
|
|
||||||
protected ObjectPermission getPermissionInstance(ObjectPermissionModel model) {
|
|
||||||
return new ObjectPermission(model.getType(), model.getObjectIdentifier());
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
protected ObjectPermissionModel getModelInstance(ModeledUser targetUser,
|
|
||||||
ObjectPermission permission) {
|
|
||||||
|
|
||||||
ObjectPermissionModel model = new ObjectPermissionModel();
|
|
||||||
|
|
||||||
// Populate model object with data from user and permission
|
|
||||||
model.setUserID(targetUser.getModel().getObjectID());
|
|
||||||
model.setUsername(targetUser.getModel().getIdentifier());
|
|
||||||
model.setType(permission.getType());
|
|
||||||
model.setObjectIdentifier(permission.getObjectIdentifier());
|
|
||||||
|
|
||||||
return model;
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Determines whether the current user has permission to update the given
|
|
||||||
* target user, adding or removing the given permissions. Such permission
|
|
||||||
* depends on whether the current user is a system administrator, whether
|
|
||||||
* they have explicit UPDATE permission on the target user, and whether
|
|
||||||
* they have explicit ADMINISTER permission on all affected objects.
|
|
||||||
*
|
|
||||||
* @param user
|
|
||||||
* The user who is changing permissions.
|
|
||||||
*
|
|
||||||
* @param targetUser
|
|
||||||
* The user whose permissions are being changed.
|
|
||||||
*
|
|
||||||
* @param permissions
|
|
||||||
* The permissions that are being added or removed from the target
|
|
||||||
* user.
|
|
||||||
*
|
|
||||||
* @return
|
|
||||||
* true if the user has permission to change the target users
|
|
||||||
* permissions as specified, false otherwise.
|
|
||||||
*
|
|
||||||
* @throws GuacamoleException
|
|
||||||
* If an error occurs while checking permission status, or if
|
|
||||||
* permission is denied to read the current user's permissions.
|
|
||||||
*/
|
|
||||||
protected boolean canAlterPermissions(AuthenticatedUser user, ModeledUser targetUser,
|
|
||||||
Collection<ObjectPermission> permissions)
|
|
||||||
throws GuacamoleException {
|
|
||||||
|
|
||||||
// A system adminstrator can do anything
|
|
||||||
if (user.getUser().isAdministrator())
|
|
||||||
return true;
|
|
||||||
|
|
||||||
// Verify user has update permission on the target user
|
|
||||||
ObjectPermissionSet userPermissionSet = user.getUser().getUserPermissions();
|
|
||||||
if (!userPermissionSet.hasPermission(ObjectPermission.Type.UPDATE, targetUser.getIdentifier()))
|
|
||||||
return false;
|
|
||||||
|
|
||||||
// Produce collection of affected identifiers
|
|
||||||
Collection<String> affectedIdentifiers = new HashSet(permissions.size());
|
|
||||||
for (ObjectPermission permission : permissions)
|
|
||||||
affectedIdentifiers.add(permission.getObjectIdentifier());
|
|
||||||
|
|
||||||
// Determine subset of affected identifiers that we have admin access to
|
|
||||||
ObjectPermissionSet affectedPermissionSet = getPermissionSet(user, user.getUser());
|
|
||||||
Collection<String> allowedSubset = affectedPermissionSet.getAccessibleObjects(
|
|
||||||
Collections.singleton(ObjectPermission.Type.ADMINISTER),
|
|
||||||
affectedIdentifiers
|
|
||||||
);
|
|
||||||
|
|
||||||
// The permissions can be altered if and only if the set of objects we
|
|
||||||
// are allowed to administer is equal to the set of objects we will be
|
|
||||||
// affecting.
|
|
||||||
|
|
||||||
return affectedIdentifiers.size() == allowedSubset.size();
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void createPermissions(AuthenticatedUser user, ModeledUser targetUser,
|
|
||||||
Collection<ObjectPermission> permissions)
|
|
||||||
throws GuacamoleException {
|
|
||||||
|
|
||||||
// Create permissions only if user has permission to do so
|
|
||||||
if (canAlterPermissions(user, targetUser, permissions)) {
|
|
||||||
Collection<ObjectPermissionModel> models = getModelInstances(targetUser, permissions);
|
|
||||||
getPermissionMapper().insert(models);
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
// User lacks permission to create object permissions
|
|
||||||
throw new GuacamoleSecurityException("Permission denied.");
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public void deletePermissions(AuthenticatedUser user, ModeledUser targetUser,
|
|
||||||
Collection<ObjectPermission> permissions)
|
|
||||||
throws GuacamoleException {
|
|
||||||
|
|
||||||
// Delete permissions only if user has permission to do so
|
|
||||||
if (canAlterPermissions(user, targetUser, permissions)) {
|
|
||||||
Collection<ObjectPermissionModel> models = getModelInstances(targetUser, permissions);
|
|
||||||
getPermissionMapper().delete(models);
|
|
||||||
return;
|
|
||||||
}
|
|
||||||
|
|
||||||
// User lacks permission to delete object permissions
|
|
||||||
throw new GuacamoleSecurityException("Permission denied.");
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Retrieves the permission of the given type associated with the given
|
* Retrieves the permission of the given type associated with the given
|
||||||
@@ -181,26 +62,9 @@ public abstract class ObjectPermissionService
|
|||||||
* @throws GuacamoleException
|
* @throws GuacamoleException
|
||||||
* If an error occurs while retrieving the requested permission.
|
* If an error occurs while retrieving the requested permission.
|
||||||
*/
|
*/
|
||||||
public ObjectPermission retrievePermission(AuthenticatedUser user,
|
ObjectPermission retrievePermission(AuthenticatedUser user,
|
||||||
ModeledUser targetUser, ObjectPermission.Type type,
|
ModeledUser targetUser, ObjectPermission.Type type,
|
||||||
String identifier) throws GuacamoleException {
|
String identifier) throws GuacamoleException;
|
||||||
|
|
||||||
// Retrieve permissions only if allowed
|
|
||||||
if (canReadPermissions(user, targetUser)) {
|
|
||||||
|
|
||||||
// Read permission from database, return null if not found
|
|
||||||
ObjectPermissionModel model = getPermissionMapper().selectOne(targetUser.getModel(), type, identifier);
|
|
||||||
if (model == null)
|
|
||||||
return null;
|
|
||||||
|
|
||||||
return getPermissionInstance(model);
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
// User cannot read this user's permissions
|
|
||||||
throw new GuacamoleSecurityException("Permission denied.");
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Retrieves the subset of the given identifiers for which the given user
|
* Retrieves the subset of the given identifiers for which the given user
|
||||||
@@ -228,29 +92,8 @@ public abstract class ObjectPermissionService
|
|||||||
* @throws GuacamoleException
|
* @throws GuacamoleException
|
||||||
* If an error occurs while retrieving permissions.
|
* If an error occurs while retrieving permissions.
|
||||||
*/
|
*/
|
||||||
public Collection<String> retrieveAccessibleIdentifiers(AuthenticatedUser user,
|
Collection<String> retrieveAccessibleIdentifiers(AuthenticatedUser user,
|
||||||
ModeledUser targetUser, Collection<ObjectPermission.Type> permissions,
|
ModeledUser targetUser, Collection<ObjectPermission.Type> permissions,
|
||||||
Collection<String> identifiers) throws GuacamoleException {
|
Collection<String> identifiers) throws GuacamoleException;
|
||||||
|
|
||||||
// Nothing is always accessible
|
|
||||||
if (identifiers.isEmpty())
|
|
||||||
return identifiers;
|
|
||||||
|
|
||||||
// Retrieve permissions only if allowed
|
|
||||||
if (canReadPermissions(user, targetUser)) {
|
|
||||||
|
|
||||||
// If user is an admin, everything is accessible
|
|
||||||
if (user.getUser().isAdministrator())
|
|
||||||
return identifiers;
|
|
||||||
|
|
||||||
// Otherwise, return explicitly-retrievable identifiers
|
|
||||||
return getPermissionMapper().selectAccessibleIdentifiers(targetUser.getModel(), permissions, identifiers);
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
// User cannot read this user's permissions
|
|
||||||
throw new GuacamoleSecurityException("Permission denied.");
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
}
|
||||||
|
@@ -47,137 +47,9 @@ import org.glyptodon.guacamole.net.auth.permission.PermissionSet;
|
|||||||
*
|
*
|
||||||
* @param <PermissionType>
|
* @param <PermissionType>
|
||||||
* The type of permission this service provides access to.
|
* The type of permission this service provides access to.
|
||||||
*
|
|
||||||
* @param <ModelType>
|
|
||||||
* The underlying model object used to represent PermissionType in the
|
|
||||||
* database.
|
|
||||||
*/
|
*/
|
||||||
public abstract class PermissionService<PermissionSetType extends PermissionSet<PermissionType>,
|
public interface PermissionService<PermissionSetType extends PermissionSet<PermissionType>,
|
||||||
PermissionType extends Permission, ModelType> {
|
PermissionType extends Permission> {
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns an instance of a mapper for the type of permission used by this
|
|
||||||
* service.
|
|
||||||
*
|
|
||||||
* @return
|
|
||||||
* A mapper which provides access to the model objects associated with
|
|
||||||
* the permissions used by this service.
|
|
||||||
*/
|
|
||||||
protected abstract PermissionMapper<ModelType> getPermissionMapper();
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns an instance of a permission which is based on the given model
|
|
||||||
* object.
|
|
||||||
*
|
|
||||||
* @param model
|
|
||||||
* The model object to use to produce the returned permission.
|
|
||||||
*
|
|
||||||
* @return
|
|
||||||
* A permission which is based on the given model object.
|
|
||||||
*/
|
|
||||||
protected abstract PermissionType getPermissionInstance(ModelType model);
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns a collection of permissions which are based on the models in
|
|
||||||
* the given collection.
|
|
||||||
*
|
|
||||||
* @param models
|
|
||||||
* The model objects to use to produce the permissions within the
|
|
||||||
* returned set.
|
|
||||||
*
|
|
||||||
* @return
|
|
||||||
* A set of permissions which are based on the models in the given
|
|
||||||
* collection.
|
|
||||||
*/
|
|
||||||
protected Set<PermissionType> getPermissionInstances(Collection<ModelType> models) {
|
|
||||||
|
|
||||||
// Create new collection of permissions by manually converting each model
|
|
||||||
Set<PermissionType> permissions = new HashSet<PermissionType>(models.size());
|
|
||||||
for (ModelType model : models)
|
|
||||||
permissions.add(getPermissionInstance(model));
|
|
||||||
|
|
||||||
return permissions;
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns an instance of a model object which is based on the given
|
|
||||||
* permission and target user.
|
|
||||||
*
|
|
||||||
* @param targetUser
|
|
||||||
* The user to whom this permission is granted.
|
|
||||||
*
|
|
||||||
* @param permission
|
|
||||||
* The permission to use to produce the returned model object.
|
|
||||||
*
|
|
||||||
* @return
|
|
||||||
* A model object which is based on the given permission and target
|
|
||||||
* user.
|
|
||||||
*/
|
|
||||||
protected abstract ModelType getModelInstance(ModeledUser targetUser,
|
|
||||||
PermissionType permission);
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns a collection of model objects which are based on the given
|
|
||||||
* permissions and target user.
|
|
||||||
*
|
|
||||||
* @param targetUser
|
|
||||||
* The user to whom this permission is granted.
|
|
||||||
*
|
|
||||||
* @param permissions
|
|
||||||
* The permissions to use to produce the returned model objects.
|
|
||||||
*
|
|
||||||
* @return
|
|
||||||
* A collection of model objects which are based on the given
|
|
||||||
* permissions and target user.
|
|
||||||
*/
|
|
||||||
protected Collection<ModelType> getModelInstances(ModeledUser targetUser,
|
|
||||||
Collection<PermissionType> permissions) {
|
|
||||||
|
|
||||||
// Create new collection of models by manually converting each permission
|
|
||||||
Collection<ModelType> models = new ArrayList<ModelType>(permissions.size());
|
|
||||||
for (PermissionType permission : permissions)
|
|
||||||
models.add(getModelInstance(targetUser, permission));
|
|
||||||
|
|
||||||
return models;
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Determines whether the given user can read the permissions currently
|
|
||||||
* granted to the given target user. If the reading user and the target
|
|
||||||
* user are not the same, then explicit READ or SYSTEM_ADMINISTER access is
|
|
||||||
* required.
|
|
||||||
*
|
|
||||||
* @param user
|
|
||||||
* The user attempting to read permissions.
|
|
||||||
*
|
|
||||||
* @param targetUser
|
|
||||||
* The user whose permissions are being read.
|
|
||||||
*
|
|
||||||
* @return
|
|
||||||
* true if permission is granted, false otherwise.
|
|
||||||
*
|
|
||||||
* @throws GuacamoleException
|
|
||||||
* If an error occurs while checking permission status, or if
|
|
||||||
* permission is denied to read the current user's permissions.
|
|
||||||
*/
|
|
||||||
protected boolean canReadPermissions(AuthenticatedUser user,
|
|
||||||
ModeledUser targetUser) throws GuacamoleException {
|
|
||||||
|
|
||||||
// A user can always read their own permissions
|
|
||||||
if (user.getUser().getIdentifier().equals(targetUser.getIdentifier()))
|
|
||||||
return true;
|
|
||||||
|
|
||||||
// A system adminstrator can do anything
|
|
||||||
if (user.getUser().isAdministrator())
|
|
||||||
return true;
|
|
||||||
|
|
||||||
// Can read permissions on target user if explicit READ is granted
|
|
||||||
ObjectPermissionSet userPermissionSet = user.getUser().getUserPermissions();
|
|
||||||
return userPermissionSet.hasPermission(ObjectPermission.Type.READ, targetUser.getIdentifier());
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns a permission set that can be used to retrieve and manipulate the
|
* Returns a permission set that can be used to retrieve and manipulate the
|
||||||
@@ -200,7 +72,7 @@ public abstract class PermissionService<PermissionSetType extends PermissionSet<
|
|||||||
* user, or if permission to retrieve the permissions of the given
|
* user, or if permission to retrieve the permissions of the given
|
||||||
* user is denied.
|
* user is denied.
|
||||||
*/
|
*/
|
||||||
public abstract PermissionSetType getPermissionSet(AuthenticatedUser user,
|
PermissionSetType getPermissionSet(AuthenticatedUser user,
|
||||||
ModeledUser targetUser) throws GuacamoleException;
|
ModeledUser targetUser) throws GuacamoleException;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -218,17 +90,8 @@ public abstract class PermissionService<PermissionSetType extends PermissionSet<
|
|||||||
* @throws GuacamoleException
|
* @throws GuacamoleException
|
||||||
* If an error occurs while retrieving the requested permissions.
|
* If an error occurs while retrieving the requested permissions.
|
||||||
*/
|
*/
|
||||||
public Set<PermissionType> retrievePermissions(AuthenticatedUser user,
|
Set<PermissionType> retrievePermissions(AuthenticatedUser user,
|
||||||
ModeledUser targetUser) throws GuacamoleException {
|
ModeledUser targetUser) throws GuacamoleException;
|
||||||
|
|
||||||
// Retrieve permissions only if allowed
|
|
||||||
if (canReadPermissions(user, targetUser))
|
|
||||||
return getPermissionInstances(getPermissionMapper().select(targetUser.getModel()));
|
|
||||||
|
|
||||||
// User cannot read this user's permissions
|
|
||||||
throw new GuacamoleSecurityException("Permission denied.");
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Creates the given permissions within the database. If any permissions
|
* Creates the given permissions within the database. If any permissions
|
||||||
@@ -247,8 +110,7 @@ public abstract class PermissionService<PermissionSetType extends PermissionSet<
|
|||||||
* If the user lacks permission to create the permissions, or an error
|
* If the user lacks permission to create the permissions, or an error
|
||||||
* occurs while creating the permissions.
|
* occurs while creating the permissions.
|
||||||
*/
|
*/
|
||||||
public abstract void createPermissions(AuthenticatedUser user,
|
void createPermissions(AuthenticatedUser user, ModeledUser targetUser,
|
||||||
ModeledUser targetUser,
|
|
||||||
Collection<PermissionType> permissions) throws GuacamoleException;
|
Collection<PermissionType> permissions) throws GuacamoleException;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -268,8 +130,7 @@ public abstract class PermissionService<PermissionSetType extends PermissionSet<
|
|||||||
* If the user lacks permission to delete the permissions, or an error
|
* If the user lacks permission to delete the permissions, or an error
|
||||||
* occurs while deleting the permissions.
|
* occurs while deleting the permissions.
|
||||||
*/
|
*/
|
||||||
public abstract void deletePermissions(AuthenticatedUser user,
|
void deletePermissions(AuthenticatedUser user, ModeledUser targetUser,
|
||||||
ModeledUser targetUser,
|
|
||||||
Collection<PermissionType> permissions) throws GuacamoleException;
|
Collection<PermissionType> permissions) throws GuacamoleException;
|
||||||
|
|
||||||
}
|
}
|
||||||
|
@@ -40,7 +40,7 @@ import org.glyptodon.guacamole.net.auth.permission.SystemPermission;
|
|||||||
* @author Michael Jumper
|
* @author Michael Jumper
|
||||||
*/
|
*/
|
||||||
public class SystemPermissionService
|
public class SystemPermissionService
|
||||||
extends PermissionService<SystemPermissionSet, SystemPermission, SystemPermissionModel> {
|
extends ModeledPermissionService<SystemPermissionSet, SystemPermission, SystemPermissionModel> {
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Mapper for system-level permissions.
|
* Mapper for system-level permissions.
|
||||||
|
@@ -35,7 +35,7 @@ import org.glyptodon.guacamole.auth.jdbc.user.ModeledUser;
|
|||||||
*
|
*
|
||||||
* @author Michael Jumper
|
* @author Michael Jumper
|
||||||
*/
|
*/
|
||||||
public class UserPermissionService extends ObjectPermissionService {
|
public class UserPermissionService extends ModeledObjectPermissionService {
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Mapper for user permissions.
|
* Mapper for user permissions.
|
||||||
|
@@ -49,7 +49,6 @@ import org.glyptodon.guacamole.net.GuacamoleSocket;
|
|||||||
import org.glyptodon.guacamole.net.GuacamoleTunnel;
|
import org.glyptodon.guacamole.net.GuacamoleTunnel;
|
||||||
import org.glyptodon.guacamole.net.auth.Connection;
|
import org.glyptodon.guacamole.net.auth.Connection;
|
||||||
import org.glyptodon.guacamole.net.auth.ConnectionGroup;
|
import org.glyptodon.guacamole.net.auth.ConnectionGroup;
|
||||||
import org.glyptodon.guacamole.net.auth.ConnectionRecord;
|
|
||||||
import org.glyptodon.guacamole.protocol.ConfiguredGuacamoleSocket;
|
import org.glyptodon.guacamole.protocol.ConfiguredGuacamoleSocket;
|
||||||
import org.glyptodon.guacamole.protocol.GuacamoleClientInformation;
|
import org.glyptodon.guacamole.protocol.GuacamoleClientInformation;
|
||||||
import org.glyptodon.guacamole.protocol.GuacamoleConfiguration;
|
import org.glyptodon.guacamole.protocol.GuacamoleConfiguration;
|
||||||
@@ -100,8 +99,8 @@ public abstract class AbstractGuacamoleTunnelService implements GuacamoleTunnelS
|
|||||||
/**
|
/**
|
||||||
* All active connections through the tunnel having a given UUID.
|
* All active connections through the tunnel having a given UUID.
|
||||||
*/
|
*/
|
||||||
private final Map<String, ConnectionRecord> activeTunnels =
|
private final Map<String, ActiveConnectionRecord> activeTunnels =
|
||||||
new ConcurrentHashMap<String, ConnectionRecord>();
|
new ConcurrentHashMap<String, ActiveConnectionRecord>();
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* All active connections to a connection having a given identifier.
|
* All active connections to a connection having a given identifier.
|
||||||
@@ -446,7 +445,7 @@ public abstract class AbstractGuacamoleTunnelService implements GuacamoleTunnelS
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public Collection<ConnectionRecord> getActiveConnections(AuthenticatedUser user)
|
public Collection<ActiveConnectionRecord> getActiveConnections(AuthenticatedUser user)
|
||||||
throws GuacamoleException {
|
throws GuacamoleException {
|
||||||
|
|
||||||
// Only administrators may see all active connections
|
// Only administrators may see all active connections
|
||||||
@@ -458,7 +457,7 @@ public abstract class AbstractGuacamoleTunnelService implements GuacamoleTunnelS
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public ConnectionRecord getActiveConnection(AuthenticatedUser user,
|
public ActiveConnectionRecord getActiveConnection(AuthenticatedUser user,
|
||||||
String tunnelUUID) throws GuacamoleException {
|
String tunnelUUID) throws GuacamoleException {
|
||||||
|
|
||||||
// Only administrators may see all active connections
|
// Only administrators may see all active connections
|
||||||
@@ -482,7 +481,7 @@ public abstract class AbstractGuacamoleTunnelService implements GuacamoleTunnelS
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public Collection<ConnectionRecord> getActiveConnections(Connection connection) {
|
public Collection<ActiveConnectionRecord> getActiveConnections(Connection connection) {
|
||||||
return activeConnections.get(connection.getIdentifier());
|
return activeConnections.get(connection.getIdentifier());
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -507,7 +506,7 @@ public abstract class AbstractGuacamoleTunnelService implements GuacamoleTunnelS
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public Collection<ConnectionRecord> getActiveConnections(ConnectionGroup connectionGroup) {
|
public Collection<ActiveConnectionRecord> getActiveConnections(ConnectionGroup connectionGroup) {
|
||||||
|
|
||||||
// If not a balancing group, assume no connections
|
// If not a balancing group, assume no connections
|
||||||
if (connectionGroup.getType() != ConnectionGroup.Type.BALANCING)
|
if (connectionGroup.getType() != ConnectionGroup.Type.BALANCING)
|
||||||
|
@@ -28,8 +28,6 @@ import java.util.HashMap;
|
|||||||
import java.util.LinkedHashMap;
|
import java.util.LinkedHashMap;
|
||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
import org.glyptodon.guacamole.net.auth.ConnectionRecord;
|
|
||||||
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Mapping of object identifiers to lists of connection records. Records are
|
* Mapping of object identifiers to lists of connection records. Records are
|
||||||
@@ -44,8 +42,8 @@ public class ActiveConnectionMultimap {
|
|||||||
/**
|
/**
|
||||||
* All active connections to a connection having a given identifier.
|
* All active connections to a connection having a given identifier.
|
||||||
*/
|
*/
|
||||||
private final Map<String, Set<ConnectionRecord>> records =
|
private final Map<String, Set<ActiveConnectionRecord>> records =
|
||||||
new HashMap<String, Set<ConnectionRecord>>();
|
new HashMap<String, Set<ActiveConnectionRecord>>();
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Stores the given connection record in the list of active connections
|
* Stores the given connection record in the list of active connections
|
||||||
@@ -57,13 +55,13 @@ public class ActiveConnectionMultimap {
|
|||||||
* @param record
|
* @param record
|
||||||
* The record associated with the active connection.
|
* The record associated with the active connection.
|
||||||
*/
|
*/
|
||||||
public void put(String identifier, ConnectionRecord record) {
|
public void put(String identifier, ActiveConnectionRecord record) {
|
||||||
synchronized (records) {
|
synchronized (records) {
|
||||||
|
|
||||||
// Get set of active connection records, creating if necessary
|
// Get set of active connection records, creating if necessary
|
||||||
Set<ConnectionRecord> connections = records.get(identifier);
|
Set<ActiveConnectionRecord> connections = records.get(identifier);
|
||||||
if (connections == null) {
|
if (connections == null) {
|
||||||
connections = Collections.synchronizedSet(Collections.newSetFromMap(new LinkedHashMap<ConnectionRecord, Boolean>()));
|
connections = Collections.synchronizedSet(Collections.newSetFromMap(new LinkedHashMap<ActiveConnectionRecord, Boolean>()));
|
||||||
records.put(identifier, connections);
|
records.put(identifier, connections);
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -83,11 +81,11 @@ public class ActiveConnectionMultimap {
|
|||||||
* @param record
|
* @param record
|
||||||
* The record associated with the active connection.
|
* The record associated with the active connection.
|
||||||
*/
|
*/
|
||||||
public void remove(String identifier, ConnectionRecord record) {
|
public void remove(String identifier, ActiveConnectionRecord record) {
|
||||||
synchronized (records) {
|
synchronized (records) {
|
||||||
|
|
||||||
// Get set of active connection records
|
// Get set of active connection records
|
||||||
Set<ConnectionRecord> connections = records.get(identifier);
|
Set<ActiveConnectionRecord> connections = records.get(identifier);
|
||||||
assert(connections != null);
|
assert(connections != null);
|
||||||
|
|
||||||
// Remove old record
|
// Remove old record
|
||||||
@@ -114,11 +112,11 @@ public class ActiveConnectionMultimap {
|
|||||||
* the given identifier, or an empty collection if there are no such
|
* the given identifier, or an empty collection if there are no such
|
||||||
* records.
|
* records.
|
||||||
*/
|
*/
|
||||||
public Collection<ConnectionRecord> get(String identifier) {
|
public Collection<ActiveConnectionRecord> get(String identifier) {
|
||||||
synchronized (records) {
|
synchronized (records) {
|
||||||
|
|
||||||
// Get set of active connection records
|
// Get set of active connection records
|
||||||
Collection<ConnectionRecord> connections = records.get(identifier);
|
Collection<ActiveConnectionRecord> connections = records.get(identifier);
|
||||||
if (connections != null)
|
if (connections != null)
|
||||||
return Collections.unmodifiableCollection(connections);
|
return Collections.unmodifiableCollection(connections);
|
||||||
|
|
||||||
|
@@ -164,11 +164,6 @@ public class ActiveConnectionRecord implements ConnectionRecord {
|
|||||||
return balancingGroup != null;
|
return balancingGroup != null;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
|
||||||
public String getIdentifier() {
|
|
||||||
return connection.getIdentifier();
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public Date getStartDate() {
|
public Date getStartDate() {
|
||||||
return startDate;
|
return startDate;
|
||||||
@@ -200,7 +195,14 @@ public class ActiveConnectionRecord implements ConnectionRecord {
|
|||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
/**
|
||||||
|
* Returns the GuacamoleTunnel currently associated with the active
|
||||||
|
* connection represented by this connection record.
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
* The GuacamoleTunnel currently associated with the active connection
|
||||||
|
* represented by this connection record.
|
||||||
|
*/
|
||||||
public GuacamoleTunnel getTunnel() {
|
public GuacamoleTunnel getTunnel() {
|
||||||
return tunnel;
|
return tunnel;
|
||||||
}
|
}
|
||||||
|
@@ -30,7 +30,6 @@ import org.glyptodon.guacamole.GuacamoleException;
|
|||||||
import org.glyptodon.guacamole.net.GuacamoleTunnel;
|
import org.glyptodon.guacamole.net.GuacamoleTunnel;
|
||||||
import org.glyptodon.guacamole.net.auth.Connection;
|
import org.glyptodon.guacamole.net.auth.Connection;
|
||||||
import org.glyptodon.guacamole.net.auth.ConnectionGroup;
|
import org.glyptodon.guacamole.net.auth.ConnectionGroup;
|
||||||
import org.glyptodon.guacamole.net.auth.ConnectionRecord;
|
|
||||||
import org.glyptodon.guacamole.protocol.GuacamoleClientInformation;
|
import org.glyptodon.guacamole.protocol.GuacamoleClientInformation;
|
||||||
|
|
||||||
|
|
||||||
@@ -57,7 +56,7 @@ public interface GuacamoleTunnelService {
|
|||||||
* If an error occurs while retrieving all active connections, or if
|
* If an error occurs while retrieving all active connections, or if
|
||||||
* permission is denied.
|
* permission is denied.
|
||||||
*/
|
*/
|
||||||
public Collection<ConnectionRecord> getActiveConnections(AuthenticatedUser user)
|
public Collection<ActiveConnectionRecord> getActiveConnections(AuthenticatedUser user)
|
||||||
throws GuacamoleException;
|
throws GuacamoleException;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -80,7 +79,7 @@ public interface GuacamoleTunnelService {
|
|||||||
* If an error occurs while retrieving all active connections, or if
|
* If an error occurs while retrieving all active connections, or if
|
||||||
* permission is denied.
|
* permission is denied.
|
||||||
*/
|
*/
|
||||||
public ConnectionRecord getActiveConnection(AuthenticatedUser user,
|
public ActiveConnectionRecord getActiveConnection(AuthenticatedUser user,
|
||||||
String tunnelUUID)
|
String tunnelUUID)
|
||||||
throws GuacamoleException;
|
throws GuacamoleException;
|
||||||
|
|
||||||
@@ -114,7 +113,7 @@ public interface GuacamoleTunnelService {
|
|||||||
throws GuacamoleException;
|
throws GuacamoleException;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns a connection containing connection records representing all
|
* Returns a collection containing connection records representing all
|
||||||
* currently-active connections using the given connection. These records
|
* currently-active connections using the given connection. These records
|
||||||
* will have usernames and start dates, but no end date, and will be
|
* will have usernames and start dates, but no end date, and will be
|
||||||
* sorted in ascending order by start date.
|
* sorted in ascending order by start date.
|
||||||
@@ -126,7 +125,7 @@ public interface GuacamoleTunnelService {
|
|||||||
* A collection containing connection records representing all
|
* A collection containing connection records representing all
|
||||||
* currently-active connections.
|
* currently-active connections.
|
||||||
*/
|
*/
|
||||||
public Collection<ConnectionRecord> getActiveConnections(Connection connection);
|
public Collection<ActiveConnectionRecord> getActiveConnections(Connection connection);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Creates a socket for the given user which connects to the given
|
* Creates a socket for the given user which connects to the given
|
||||||
@@ -171,6 +170,6 @@ public interface GuacamoleTunnelService {
|
|||||||
* A collection containing connection records representing all
|
* A collection containing connection records representing all
|
||||||
* currently-active connections.
|
* currently-active connections.
|
||||||
*/
|
*/
|
||||||
public Collection<ConnectionRecord> getActiveConnections(ConnectionGroup connectionGroup);
|
public Collection<ActiveConnectionRecord> getActiveConnections(ConnectionGroup connectionGroup);
|
||||||
|
|
||||||
}
|
}
|
||||||
|
@@ -23,11 +23,12 @@
|
|||||||
package org.glyptodon.guacamole.auth.jdbc.user;
|
package org.glyptodon.guacamole.auth.jdbc.user;
|
||||||
|
|
||||||
import com.google.inject.Inject;
|
import com.google.inject.Inject;
|
||||||
import org.glyptodon.guacamole.auth.jdbc.base.DirectoryObject;
|
import org.glyptodon.guacamole.auth.jdbc.base.ModeledDirectoryObject;
|
||||||
import org.glyptodon.guacamole.auth.jdbc.security.PasswordEncryptionService;
|
import org.glyptodon.guacamole.auth.jdbc.security.PasswordEncryptionService;
|
||||||
import org.glyptodon.guacamole.auth.jdbc.security.SaltService;
|
import org.glyptodon.guacamole.auth.jdbc.security.SaltService;
|
||||||
import org.glyptodon.guacamole.auth.jdbc.permission.SystemPermissionService;
|
import org.glyptodon.guacamole.auth.jdbc.permission.SystemPermissionService;
|
||||||
import org.glyptodon.guacamole.GuacamoleException;
|
import org.glyptodon.guacamole.GuacamoleException;
|
||||||
|
import org.glyptodon.guacamole.auth.jdbc.activeconnection.ActiveConnectionPermissionService;
|
||||||
import org.glyptodon.guacamole.auth.jdbc.permission.ConnectionGroupPermissionService;
|
import org.glyptodon.guacamole.auth.jdbc.permission.ConnectionGroupPermissionService;
|
||||||
import org.glyptodon.guacamole.auth.jdbc.permission.ConnectionPermissionService;
|
import org.glyptodon.guacamole.auth.jdbc.permission.ConnectionPermissionService;
|
||||||
import org.glyptodon.guacamole.auth.jdbc.permission.UserPermissionService;
|
import org.glyptodon.guacamole.auth.jdbc.permission.UserPermissionService;
|
||||||
@@ -42,7 +43,7 @@ import org.glyptodon.guacamole.net.auth.permission.SystemPermissionSet;
|
|||||||
* @author James Muehlner
|
* @author James Muehlner
|
||||||
* @author Michael Jumper
|
* @author Michael Jumper
|
||||||
*/
|
*/
|
||||||
public class ModeledUser extends DirectoryObject<UserModel> implements User {
|
public class ModeledUser extends ModeledDirectoryObject<UserModel> implements User {
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Service for hashing passwords.
|
* Service for hashing passwords.
|
||||||
@@ -73,7 +74,13 @@ public class ModeledUser extends DirectoryObject<UserModel> implements User {
|
|||||||
*/
|
*/
|
||||||
@Inject
|
@Inject
|
||||||
private ConnectionGroupPermissionService connectionGroupPermissionService;
|
private ConnectionGroupPermissionService connectionGroupPermissionService;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Service for retrieving active connection permissions.
|
||||||
|
*/
|
||||||
|
@Inject
|
||||||
|
private ActiveConnectionPermissionService activeConnectionPermissionService;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Service for retrieving user permissions.
|
* Service for retrieving user permissions.
|
||||||
*/
|
*/
|
||||||
@@ -160,6 +167,12 @@ public class ModeledUser extends DirectoryObject<UserModel> implements User {
|
|||||||
return connectionGroupPermissionService.getPermissionSet(getCurrentUser(), this);
|
return connectionGroupPermissionService.getPermissionSet(getCurrentUser(), this);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public ObjectPermissionSet getActiveConnectionPermissions()
|
||||||
|
throws GuacamoleException {
|
||||||
|
return activeConnectionPermissionService.getPermissionSet(getCurrentUser(), this);
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public ObjectPermissionSet getUserPermissions()
|
public ObjectPermissionSet getUserPermissions()
|
||||||
throws GuacamoleException {
|
throws GuacamoleException {
|
||||||
|
@@ -28,14 +28,12 @@ import org.glyptodon.guacamole.auth.jdbc.connectiongroup.ConnectionGroupDirector
|
|||||||
import org.glyptodon.guacamole.auth.jdbc.connection.ConnectionDirectory;
|
import org.glyptodon.guacamole.auth.jdbc.connection.ConnectionDirectory;
|
||||||
import com.google.inject.Inject;
|
import com.google.inject.Inject;
|
||||||
import com.google.inject.Provider;
|
import com.google.inject.Provider;
|
||||||
import java.util.ArrayList;
|
|
||||||
import java.util.Collection;
|
|
||||||
import org.glyptodon.guacamole.GuacamoleException;
|
import org.glyptodon.guacamole.GuacamoleException;
|
||||||
import org.glyptodon.guacamole.auth.jdbc.base.RestrictedObject;
|
import org.glyptodon.guacamole.auth.jdbc.base.RestrictedObject;
|
||||||
import org.glyptodon.guacamole.auth.jdbc.tunnel.GuacamoleTunnelService;
|
import org.glyptodon.guacamole.auth.jdbc.activeconnection.ActiveConnectionDirectory;
|
||||||
|
import org.glyptodon.guacamole.net.auth.ActiveConnection;
|
||||||
import org.glyptodon.guacamole.net.auth.Connection;
|
import org.glyptodon.guacamole.net.auth.Connection;
|
||||||
import org.glyptodon.guacamole.net.auth.ConnectionGroup;
|
import org.glyptodon.guacamole.net.auth.ConnectionGroup;
|
||||||
import org.glyptodon.guacamole.net.auth.ConnectionRecord;
|
|
||||||
import org.glyptodon.guacamole.net.auth.Directory;
|
import org.glyptodon.guacamole.net.auth.Directory;
|
||||||
import org.glyptodon.guacamole.net.auth.User;
|
import org.glyptodon.guacamole.net.auth.User;
|
||||||
|
|
||||||
@@ -49,12 +47,6 @@ import org.glyptodon.guacamole.net.auth.User;
|
|||||||
public class UserContext extends RestrictedObject
|
public class UserContext extends RestrictedObject
|
||||||
implements org.glyptodon.guacamole.net.auth.UserContext {
|
implements org.glyptodon.guacamole.net.auth.UserContext {
|
||||||
|
|
||||||
/**
|
|
||||||
* Service for creating and tracking tunnels.
|
|
||||||
*/
|
|
||||||
@Inject
|
|
||||||
private GuacamoleTunnelService tunnelService;
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* User directory restricted by the permissions of the user associated
|
* User directory restricted by the permissions of the user associated
|
||||||
* with this context.
|
* with this context.
|
||||||
@@ -76,6 +68,13 @@ public class UserContext extends RestrictedObject
|
|||||||
@Inject
|
@Inject
|
||||||
private ConnectionGroupDirectory connectionGroupDirectory;
|
private ConnectionGroupDirectory connectionGroupDirectory;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* ActiveConnection directory restricted by the permissions of the user
|
||||||
|
* associated with this context.
|
||||||
|
*/
|
||||||
|
@Inject
|
||||||
|
private ActiveConnectionDirectory activeConnectionDirectory;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Provider for creating the root group.
|
* Provider for creating the root group.
|
||||||
*/
|
*/
|
||||||
@@ -91,6 +90,7 @@ public class UserContext extends RestrictedObject
|
|||||||
userDirectory.init(currentUser);
|
userDirectory.init(currentUser);
|
||||||
connectionDirectory.init(currentUser);
|
connectionDirectory.init(currentUser);
|
||||||
connectionGroupDirectory.init(currentUser);
|
connectionGroupDirectory.init(currentUser);
|
||||||
|
activeConnectionDirectory.init(currentUser);
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -114,6 +114,12 @@ public class UserContext extends RestrictedObject
|
|||||||
return connectionGroupDirectory;
|
return connectionGroupDirectory;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Directory<ActiveConnection> getActiveConnectionDirectory()
|
||||||
|
throws GuacamoleException {
|
||||||
|
return activeConnectionDirectory;
|
||||||
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public ConnectionGroup getRootConnectionGroup() throws GuacamoleException {
|
public ConnectionGroup getRootConnectionGroup() throws GuacamoleException {
|
||||||
|
|
||||||
@@ -124,29 +130,4 @@ public class UserContext extends RestrictedObject
|
|||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
|
||||||
public Collection<ConnectionRecord> getActiveConnections()
|
|
||||||
throws GuacamoleException {
|
|
||||||
return tunnelService.getActiveConnections(getCurrentUser());
|
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public Collection<ConnectionRecord> getActiveConnections(Collection<String> tunnelUUIDs)
|
|
||||||
throws GuacamoleException {
|
|
||||||
|
|
||||||
// Look up active connections for each given tunnel UUID
|
|
||||||
Collection<ConnectionRecord> records = new ArrayList<ConnectionRecord>(tunnelUUIDs.size());
|
|
||||||
for (String tunnelUUID : tunnelUUIDs) {
|
|
||||||
|
|
||||||
// Add corresponding record only if it exists
|
|
||||||
ConnectionRecord record = tunnelService.getActiveConnection(getCurrentUser(), tunnelUUID);
|
|
||||||
if (record != null)
|
|
||||||
records.add(record);
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
return records;
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
}
|
||||||
|
@@ -22,7 +22,7 @@
|
|||||||
|
|
||||||
package org.glyptodon.guacamole.auth.jdbc.user;
|
package org.glyptodon.guacamole.auth.jdbc.user;
|
||||||
|
|
||||||
import org.glyptodon.guacamole.auth.jdbc.base.DirectoryObjectMapper;
|
import org.glyptodon.guacamole.auth.jdbc.base.ModeledDirectoryObjectMapper;
|
||||||
import org.apache.ibatis.annotations.Param;
|
import org.apache.ibatis.annotations.Param;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -30,7 +30,7 @@ import org.apache.ibatis.annotations.Param;
|
|||||||
*
|
*
|
||||||
* @author Michael Jumper
|
* @author Michael Jumper
|
||||||
*/
|
*/
|
||||||
public interface UserMapper extends DirectoryObjectMapper<UserModel> {
|
public interface UserMapper extends ModeledDirectoryObjectMapper<UserModel> {
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns the user having the given username, if any. If no such user
|
* Returns the user having the given username, if any. If no such user
|
||||||
|
@@ -28,8 +28,8 @@ import java.util.Arrays;
|
|||||||
import java.util.Collection;
|
import java.util.Collection;
|
||||||
import java.util.Collections;
|
import java.util.Collections;
|
||||||
import org.glyptodon.guacamole.net.auth.Credentials;
|
import org.glyptodon.guacamole.net.auth.Credentials;
|
||||||
import org.glyptodon.guacamole.auth.jdbc.base.DirectoryObjectMapper;
|
import org.glyptodon.guacamole.auth.jdbc.base.ModeledDirectoryObjectMapper;
|
||||||
import org.glyptodon.guacamole.auth.jdbc.base.DirectoryObjectService;
|
import org.glyptodon.guacamole.auth.jdbc.base.ModeledDirectoryObjectService;
|
||||||
import org.glyptodon.guacamole.GuacamoleClientException;
|
import org.glyptodon.guacamole.GuacamoleClientException;
|
||||||
import org.glyptodon.guacamole.GuacamoleException;
|
import org.glyptodon.guacamole.GuacamoleException;
|
||||||
import org.glyptodon.guacamole.GuacamoleUnsupportedException;
|
import org.glyptodon.guacamole.GuacamoleUnsupportedException;
|
||||||
@@ -49,7 +49,7 @@ import org.glyptodon.guacamole.net.auth.permission.SystemPermissionSet;
|
|||||||
*
|
*
|
||||||
* @author Michael Jumper, James Muehlner
|
* @author Michael Jumper, James Muehlner
|
||||||
*/
|
*/
|
||||||
public class UserService extends DirectoryObjectService<ModeledUser, User, UserModel> {
|
public class UserService extends ModeledDirectoryObjectService<ModeledUser, User, UserModel> {
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* All user permissions which are implicitly granted to the new user upon
|
* All user permissions which are implicitly granted to the new user upon
|
||||||
@@ -85,7 +85,7 @@ public class UserService extends DirectoryObjectService<ModeledUser, User, UserM
|
|||||||
private PasswordEncryptionService encryptionService;
|
private PasswordEncryptionService encryptionService;
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
protected DirectoryObjectMapper<UserModel> getObjectMapper() {
|
protected ModeledDirectoryObjectMapper<UserModel> getObjectMapper() {
|
||||||
return userMapper;
|
return userMapper;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@@ -0,0 +1,120 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (C) 2015 Glyptodon LLC
|
||||||
|
*
|
||||||
|
* Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
* of this software and associated documentation files (the "Software"), to deal
|
||||||
|
* in the Software without restriction, including without limitation the rights
|
||||||
|
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
||||||
|
* copies of the Software, and to permit persons to whom the Software is
|
||||||
|
* furnished to do so, subject to the following conditions:
|
||||||
|
*
|
||||||
|
* The above copyright notice and this permission notice shall be included in
|
||||||
|
* all copies or substantial portions of the Software.
|
||||||
|
*
|
||||||
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
||||||
|
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
||||||
|
* THE SOFTWARE.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package org.glyptodon.guacamole.net.auth;
|
||||||
|
|
||||||
|
import java.util.Date;
|
||||||
|
import org.glyptodon.guacamole.net.GuacamoleTunnel;
|
||||||
|
|
||||||
|
public abstract class AbstractActiveConnection implements ActiveConnection {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The identifier of this active connection.
|
||||||
|
*/
|
||||||
|
private String identifier;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The identifier of the associated connection.
|
||||||
|
*/
|
||||||
|
private String connectionIdentifier;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The date and time this active connection began.
|
||||||
|
*/
|
||||||
|
private Date startDate;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The remote host that initiated this connection.
|
||||||
|
*/
|
||||||
|
private String remoteHost;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The username of the user that initiated this connection.
|
||||||
|
*/
|
||||||
|
private String username;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The underlying GuacamoleTunnel.
|
||||||
|
*/
|
||||||
|
private GuacamoleTunnel tunnel;
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String getIdentifier() {
|
||||||
|
return identifier;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void setIdentifier(String identifier) {
|
||||||
|
this.identifier = identifier;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String getConnectionIdentifier() {
|
||||||
|
return connectionIdentifier;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void setConnectionIdentifier(String connnectionIdentifier) {
|
||||||
|
this.connectionIdentifier = connnectionIdentifier;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public Date getStartDate() {
|
||||||
|
return startDate;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void setStartDate(Date startDate) {
|
||||||
|
this.startDate = startDate;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String getRemoteHost() {
|
||||||
|
return remoteHost;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void setRemoteHost(String remoteHost) {
|
||||||
|
this.remoteHost = remoteHost;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public String getUsername() {
|
||||||
|
return username;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void setUsername(String username) {
|
||||||
|
this.username = username;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public GuacamoleTunnel getTunnel() {
|
||||||
|
return tunnel;
|
||||||
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public void setTunnel(GuacamoleTunnel tunnel) {
|
||||||
|
this.tunnel = tunnel;
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
@@ -0,0 +1,122 @@
|
|||||||
|
/*
|
||||||
|
* Copyright (C) 2015 Glyptodon LLC
|
||||||
|
*
|
||||||
|
* Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
|
* of this software and associated documentation files (the "Software"), to deal
|
||||||
|
* in the Software without restriction, including without limitation the rights
|
||||||
|
* to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
||||||
|
* copies of the Software, and to permit persons to whom the Software is
|
||||||
|
* furnished to do so, subject to the following conditions:
|
||||||
|
*
|
||||||
|
* The above copyright notice and this permission notice shall be included in
|
||||||
|
* all copies or substantial portions of the Software.
|
||||||
|
*
|
||||||
|
* THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
||||||
|
* IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
||||||
|
* FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
||||||
|
* AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
||||||
|
* LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
||||||
|
* OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
|
||||||
|
* THE SOFTWARE.
|
||||||
|
*/
|
||||||
|
|
||||||
|
package org.glyptodon.guacamole.net.auth;
|
||||||
|
|
||||||
|
import java.util.Date;
|
||||||
|
import org.glyptodon.guacamole.net.GuacamoleTunnel;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* A pairing of username and GuacamoleTunnel representing an active usage of a
|
||||||
|
* particular connection.
|
||||||
|
*
|
||||||
|
* @author Michael Jumper
|
||||||
|
*/
|
||||||
|
public interface ActiveConnection extends Identifiable {
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns the identifier of the connection being actively used.
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
* The identifier of the connection being actively used.
|
||||||
|
*/
|
||||||
|
String getConnectionIdentifier();
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Sets the identifier of the connection being actively used.
|
||||||
|
*
|
||||||
|
* @param connnectionIdentifier
|
||||||
|
* The identifier of the connection being actively used.
|
||||||
|
*/
|
||||||
|
void setConnectionIdentifier(String connnectionIdentifier);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns the date and time the connection began.
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
* The date and time the connection began.
|
||||||
|
*/
|
||||||
|
Date getStartDate();
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Sets the date and time the connection began.
|
||||||
|
*
|
||||||
|
* @param startDate
|
||||||
|
* The date and time the connection began.
|
||||||
|
*/
|
||||||
|
void setStartDate(Date startDate);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns the hostname or IP address of the remote host that initiated the
|
||||||
|
* connection, if known. If the hostname or IP address is not known, null
|
||||||
|
* is returned.
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
* The hostname or IP address of the remote host, or null if this
|
||||||
|
* information is not available.
|
||||||
|
*/
|
||||||
|
String getRemoteHost();
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Sets the hostname or IP address of the remote host that initiated the
|
||||||
|
* connection.
|
||||||
|
*
|
||||||
|
* @param remoteHost
|
||||||
|
* The hostname or IP address of the remote host, or null if this
|
||||||
|
* information is not available.
|
||||||
|
*/
|
||||||
|
void setRemoteHost(String remoteHost);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns the name of the user who is using this connection.
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
* The name of the user who is using this connection.
|
||||||
|
*/
|
||||||
|
String getUsername();
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Sets the name of the user who is using this connection.
|
||||||
|
*
|
||||||
|
* @param username
|
||||||
|
* The name of the user who is using this connection.
|
||||||
|
*/
|
||||||
|
void setUsername(String username);
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns the connected GuacamoleTunnel being used. This may be null if
|
||||||
|
* access to the underlying tunnel is denied.
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
* The connected GuacamoleTunnel, or null if permission is denied.
|
||||||
|
*/
|
||||||
|
GuacamoleTunnel getTunnel();
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Sets the connected GuacamoleTunnel being used.
|
||||||
|
*
|
||||||
|
* @param tunnel
|
||||||
|
* The connected GuacamoleTunnel, or null if permission is denied.
|
||||||
|
*/
|
||||||
|
void setTunnel(GuacamoleTunnel tunnel);
|
||||||
|
|
||||||
|
}
|
@@ -23,7 +23,6 @@
|
|||||||
package org.glyptodon.guacamole.net.auth;
|
package org.glyptodon.guacamole.net.auth;
|
||||||
|
|
||||||
import java.util.Date;
|
import java.util.Date;
|
||||||
import org.glyptodon.guacamole.net.GuacamoleTunnel;
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* A logging record describing when a user started and ended usage of a
|
* A logging record describing when a user started and ended usage of a
|
||||||
@@ -33,16 +32,6 @@ import org.glyptodon.guacamole.net.GuacamoleTunnel;
|
|||||||
*/
|
*/
|
||||||
public interface ConnectionRecord {
|
public interface ConnectionRecord {
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns the identifier of the connection associated with this connection
|
|
||||||
* record.
|
|
||||||
*
|
|
||||||
* @return
|
|
||||||
* The identifier of the connection associated with this connection
|
|
||||||
* record.
|
|
||||||
*/
|
|
||||||
public String getIdentifier();
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns the date and time the connection began.
|
* Returns the date and time the connection began.
|
||||||
*
|
*
|
||||||
@@ -87,15 +76,4 @@ public interface ConnectionRecord {
|
|||||||
*/
|
*/
|
||||||
public boolean isActive();
|
public boolean isActive();
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns the connected GuacamoleTunnel of the connection associated with
|
|
||||||
* this record, if any. If the connection is not active, or access to
|
|
||||||
* the socket is denied, null is returned.
|
|
||||||
*
|
|
||||||
* @return
|
|
||||||
* The connected GuacamoleTunnel, if any, or null if the connection is
|
|
||||||
* not active or permission is denied.
|
|
||||||
*/
|
|
||||||
public GuacamoleTunnel getTunnel();
|
|
||||||
|
|
||||||
}
|
}
|
||||||
|
@@ -92,6 +92,21 @@ public interface User extends Identifiable {
|
|||||||
ObjectPermissionSet getConnectionGroupPermissions()
|
ObjectPermissionSet getConnectionGroupPermissions()
|
||||||
throws GuacamoleException;
|
throws GuacamoleException;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns all permissions given to this user regarding currently-active
|
||||||
|
* connections.
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
* An ObjectPermissionSet of all active connection permissions granted
|
||||||
|
* to this user.
|
||||||
|
*
|
||||||
|
* @throws GuacamoleException
|
||||||
|
* If an error occurs while retrieving permissions, or if reading all
|
||||||
|
* permissions is not allowed.
|
||||||
|
*/
|
||||||
|
ObjectPermissionSet getActiveConnectionPermissions()
|
||||||
|
throws GuacamoleException;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns all user permissions given to this user.
|
* Returns all user permissions given to this user.
|
||||||
*
|
*
|
||||||
|
@@ -22,7 +22,6 @@
|
|||||||
|
|
||||||
package org.glyptodon.guacamole.net.auth;
|
package org.glyptodon.guacamole.net.auth;
|
||||||
|
|
||||||
import java.util.Collection;
|
|
||||||
import org.glyptodon.guacamole.GuacamoleException;
|
import org.glyptodon.guacamole.GuacamoleException;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -83,6 +82,21 @@ public interface UserContext {
|
|||||||
Directory<ConnectionGroup> getConnectionGroupDirectory()
|
Directory<ConnectionGroup> getConnectionGroupDirectory()
|
||||||
throws GuacamoleException;
|
throws GuacamoleException;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Retrieves a Directory which can be used to view and manipulate
|
||||||
|
* active connections, but only as allowed by the permissions given to the
|
||||||
|
* user.
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
* A Directory whose operations are bound by the permissions of the
|
||||||
|
* user.
|
||||||
|
*
|
||||||
|
* @throws GuacamoleException
|
||||||
|
* If an error occurs while creating the Directory.
|
||||||
|
*/
|
||||||
|
Directory<ActiveConnection> getActiveConnectionDirectory()
|
||||||
|
throws GuacamoleException;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Retrieves a connection group which can be used to view and manipulate
|
* Retrieves a connection group which can be used to view and manipulate
|
||||||
* connections, but only as allowed by the permissions given to the user of
|
* connections, but only as allowed by the permissions given to the user of
|
||||||
@@ -96,41 +110,4 @@ public interface UserContext {
|
|||||||
*/
|
*/
|
||||||
ConnectionGroup getRootConnectionGroup() throws GuacamoleException;
|
ConnectionGroup getRootConnectionGroup() throws GuacamoleException;
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns a collection of connection records associated with all active
|
|
||||||
* connections to which the current user has access. For an administrative
|
|
||||||
* user, this may include connections associated with other users.
|
|
||||||
*
|
|
||||||
* @return
|
|
||||||
* A collection of all connection records associated with active
|
|
||||||
* connections to which the current user has access.
|
|
||||||
*
|
|
||||||
* @throws GuacamoleException
|
|
||||||
* If an error occurs while reading active connection records, or if
|
|
||||||
* permission is denied.
|
|
||||||
*/
|
|
||||||
Collection<ConnectionRecord> getActiveConnections()
|
|
||||||
throws GuacamoleException;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Returns the connection records associated with the active connections
|
|
||||||
* having the tunnels with the given UUIDs. An active connection will only
|
|
||||||
* be returned if the current user has access.
|
|
||||||
*
|
|
||||||
* @param tunnelUUIDs
|
|
||||||
* The UUIDs of the tunnels whose associated connection records should
|
|
||||||
* be returned.
|
|
||||||
*
|
|
||||||
* @return
|
|
||||||
* A collection of all connection records associated with the active
|
|
||||||
* connections having the tunnels with the given UUIDs, if any, or an
|
|
||||||
* empty collection if no such connections exist.
|
|
||||||
*
|
|
||||||
* @throws GuacamoleException
|
|
||||||
* If an error occurs while reading active connection records, or if
|
|
||||||
* permission is denied.
|
|
||||||
*/
|
|
||||||
Collection<ConnectionRecord> getActiveConnections(Collection<String> tunnelUUIDs)
|
|
||||||
throws GuacamoleException;
|
|
||||||
|
|
||||||
}
|
}
|
||||||
|
@@ -130,4 +130,10 @@ public class SimpleUser extends AbstractUser {
|
|||||||
return new SimpleObjectPermissionSet();
|
return new SimpleObjectPermissionSet();
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public ObjectPermissionSet getActiveConnectionPermissions()
|
||||||
|
throws GuacamoleException {
|
||||||
|
return new SimpleObjectPermissionSet();
|
||||||
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
@@ -28,9 +28,9 @@ import java.util.Collections;
|
|||||||
import java.util.Map;
|
import java.util.Map;
|
||||||
import java.util.UUID;
|
import java.util.UUID;
|
||||||
import org.glyptodon.guacamole.GuacamoleException;
|
import org.glyptodon.guacamole.GuacamoleException;
|
||||||
|
import org.glyptodon.guacamole.net.auth.ActiveConnection;
|
||||||
import org.glyptodon.guacamole.net.auth.Connection;
|
import org.glyptodon.guacamole.net.auth.Connection;
|
||||||
import org.glyptodon.guacamole.net.auth.ConnectionGroup;
|
import org.glyptodon.guacamole.net.auth.ConnectionGroup;
|
||||||
import org.glyptodon.guacamole.net.auth.ConnectionRecord;
|
|
||||||
import org.glyptodon.guacamole.net.auth.Directory;
|
import org.glyptodon.guacamole.net.auth.Directory;
|
||||||
import org.glyptodon.guacamole.net.auth.User;
|
import org.glyptodon.guacamole.net.auth.User;
|
||||||
import org.glyptodon.guacamole.net.auth.UserContext;
|
import org.glyptodon.guacamole.net.auth.UserContext;
|
||||||
@@ -169,15 +169,9 @@ public class SimpleUserContext implements UserContext {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public Collection<ConnectionRecord> getActiveConnections()
|
public Directory<ActiveConnection> getActiveConnectionDirectory()
|
||||||
throws GuacamoleException {
|
throws GuacamoleException {
|
||||||
return Collections.EMPTY_LIST;
|
return new SimpleDirectory<ActiveConnection>();
|
||||||
}
|
|
||||||
|
|
||||||
@Override
|
|
||||||
public Collection<ConnectionRecord> getActiveConnections(Collection<String> tunnelUUID)
|
|
||||||
throws GuacamoleException {
|
|
||||||
return Collections.EMPTY_LIST;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
@@ -31,7 +31,7 @@ import org.glyptodon.guacamole.net.basic.rest.clipboard.ClipboardRESTService;
|
|||||||
import org.glyptodon.guacamole.net.basic.rest.connection.ConnectionRESTService;
|
import org.glyptodon.guacamole.net.basic.rest.connection.ConnectionRESTService;
|
||||||
import org.glyptodon.guacamole.net.basic.rest.connectiongroup.ConnectionGroupRESTService;
|
import org.glyptodon.guacamole.net.basic.rest.connectiongroup.ConnectionGroupRESTService;
|
||||||
import org.glyptodon.guacamole.net.basic.rest.protocol.ProtocolRESTService;
|
import org.glyptodon.guacamole.net.basic.rest.protocol.ProtocolRESTService;
|
||||||
import org.glyptodon.guacamole.net.basic.rest.tunnel.TunnelRESTService;
|
import org.glyptodon.guacamole.net.basic.rest.activeconnection.ActiveConnectionRESTService;
|
||||||
import org.glyptodon.guacamole.net.basic.rest.user.UserRESTService;
|
import org.glyptodon.guacamole.net.basic.rest.user.UserRESTService;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -51,7 +51,7 @@ public class RESTServletModule extends ServletModule {
|
|||||||
bind(ProtocolRESTService.class);
|
bind(ProtocolRESTService.class);
|
||||||
bind(UserRESTService.class);
|
bind(UserRESTService.class);
|
||||||
bind(TokenRESTService.class);
|
bind(TokenRESTService.class);
|
||||||
bind(TunnelRESTService.class);
|
bind(ActiveConnectionRESTService.class);
|
||||||
|
|
||||||
// Set up the servlet and JSON mappings
|
// Set up the servlet and JSON mappings
|
||||||
bind(GuiceContainer.class);
|
bind(GuiceContainer.class);
|
||||||
|
@@ -20,22 +20,29 @@
|
|||||||
* THE SOFTWARE.
|
* THE SOFTWARE.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
package org.glyptodon.guacamole.net.basic.rest.tunnel;
|
package org.glyptodon.guacamole.net.basic.rest.activeconnection;
|
||||||
|
|
||||||
import java.util.Date;
|
import java.util.Date;
|
||||||
import org.glyptodon.guacamole.net.auth.ConnectionRecord;
|
import org.glyptodon.guacamole.net.auth.ActiveConnection;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Tunnel-related information which may be exposed through the REST endpoints.
|
* Information related to active connections which may be exposed through the
|
||||||
|
* REST endpoints.
|
||||||
*
|
*
|
||||||
* @author Michael Jumper
|
* @author Michael Jumper
|
||||||
*/
|
*/
|
||||||
public class APITunnel {
|
public class APIActiveConnection {
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The identifier of the connection associated with this tunnel.
|
* The identifier of the active connection itself.
|
||||||
*/
|
*/
|
||||||
private final String identifier;
|
private final String identifier;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The identifier of the connection associated with this
|
||||||
|
* active connection.
|
||||||
|
*/
|
||||||
|
private final String connectionIdentifier;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The date and time the connection began.
|
* The date and time the connection began.
|
||||||
@@ -53,26 +60,18 @@ public class APITunnel {
|
|||||||
private final String username;
|
private final String username;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The UUID of the tunnel.
|
* Creates a new APIActiveConnection, copying the information from the given
|
||||||
*/
|
* active connection.
|
||||||
private final String uuid;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Creates a new APITunnel, copying the information from the given
|
|
||||||
* connection record.
|
|
||||||
*
|
*
|
||||||
* @param record
|
* @param connection
|
||||||
* The record to copy data from.
|
* The active connection to copy data from.
|
||||||
*
|
|
||||||
* @param uuid
|
|
||||||
* The UUID of the associated GuacamoleTunnel.
|
|
||||||
*/
|
*/
|
||||||
public APITunnel(ConnectionRecord record, String uuid) {
|
public APIActiveConnection(ActiveConnection connection) {
|
||||||
this.identifier = record.getIdentifier();
|
this.identifier = connection.getIdentifier();
|
||||||
this.startDate = record.getStartDate();
|
this.connectionIdentifier = connection.getConnectionIdentifier();
|
||||||
this.remoteHost = record.getRemoteHost();
|
this.startDate = connection.getStartDate();
|
||||||
this.username = record.getUsername();
|
this.remoteHost = connection.getRemoteHost();
|
||||||
this.uuid = uuid;
|
this.username = connection.getUsername();
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -81,8 +80,8 @@ public class APITunnel {
|
|||||||
* @return
|
* @return
|
||||||
* The identifier of the connection associated with this tunnel.
|
* The identifier of the connection associated with this tunnel.
|
||||||
*/
|
*/
|
||||||
public String getIdentifier() {
|
public String getConnectionIdentifier() {
|
||||||
return identifier;
|
return connectionIdentifier;
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -117,14 +116,15 @@ public class APITunnel {
|
|||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns the UUID of the underlying Guacamole tunnel. Absolutely every
|
* Returns the identifier of the active connection itself. This is
|
||||||
* Guacamole tunnel has an associated UUID.
|
* distinct from the connection identifier, and uniquely identifies a
|
||||||
|
* specific use of a connection.
|
||||||
*
|
*
|
||||||
* @return
|
* @return
|
||||||
* The UUID of the underlying Guacamole tunnel.
|
* The identifier of the active connection.
|
||||||
*/
|
*/
|
||||||
public String getUUID() {
|
public String getIdentifier() {
|
||||||
return uuid;
|
return identifier;
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
@@ -20,10 +20,9 @@
|
|||||||
* THE SOFTWARE.
|
* THE SOFTWARE.
|
||||||
*/
|
*/
|
||||||
|
|
||||||
package org.glyptodon.guacamole.net.basic.rest.tunnel;
|
package org.glyptodon.guacamole.net.basic.rest.activeconnection;
|
||||||
|
|
||||||
import com.google.inject.Inject;
|
import com.google.inject.Inject;
|
||||||
import java.util.ArrayList;
|
|
||||||
import java.util.Collection;
|
import java.util.Collection;
|
||||||
import java.util.HashMap;
|
import java.util.HashMap;
|
||||||
import java.util.List;
|
import java.util.List;
|
||||||
@@ -37,9 +36,14 @@ import javax.ws.rs.core.MediaType;
|
|||||||
import org.glyptodon.guacamole.GuacamoleClientException;
|
import org.glyptodon.guacamole.GuacamoleClientException;
|
||||||
import org.glyptodon.guacamole.GuacamoleException;
|
import org.glyptodon.guacamole.GuacamoleException;
|
||||||
import org.glyptodon.guacamole.GuacamoleUnsupportedException;
|
import org.glyptodon.guacamole.GuacamoleUnsupportedException;
|
||||||
import org.glyptodon.guacamole.net.GuacamoleTunnel;
|
import org.glyptodon.guacamole.net.auth.ActiveConnection;
|
||||||
import org.glyptodon.guacamole.net.auth.ConnectionRecord;
|
import org.glyptodon.guacamole.net.auth.Directory;
|
||||||
|
import org.glyptodon.guacamole.net.auth.User;
|
||||||
import org.glyptodon.guacamole.net.auth.UserContext;
|
import org.glyptodon.guacamole.net.auth.UserContext;
|
||||||
|
import org.glyptodon.guacamole.net.auth.permission.ObjectPermission;
|
||||||
|
import org.glyptodon.guacamole.net.auth.permission.ObjectPermissionSet;
|
||||||
|
import org.glyptodon.guacamole.net.auth.permission.SystemPermission;
|
||||||
|
import org.glyptodon.guacamole.net.auth.permission.SystemPermissionSet;
|
||||||
import org.glyptodon.guacamole.net.basic.rest.APIPatch;
|
import org.glyptodon.guacamole.net.basic.rest.APIPatch;
|
||||||
import org.glyptodon.guacamole.net.basic.rest.AuthProviderRESTExposure;
|
import org.glyptodon.guacamole.net.basic.rest.AuthProviderRESTExposure;
|
||||||
import org.glyptodon.guacamole.net.basic.rest.PATCH;
|
import org.glyptodon.guacamole.net.basic.rest.PATCH;
|
||||||
@@ -52,15 +56,15 @@ import org.slf4j.LoggerFactory;
|
|||||||
*
|
*
|
||||||
* @author Michael Jumper
|
* @author Michael Jumper
|
||||||
*/
|
*/
|
||||||
@Path("/tunnels")
|
@Path("/activeConnections")
|
||||||
@Produces(MediaType.APPLICATION_JSON)
|
@Produces(MediaType.APPLICATION_JSON)
|
||||||
@Consumes(MediaType.APPLICATION_JSON)
|
@Consumes(MediaType.APPLICATION_JSON)
|
||||||
public class TunnelRESTService {
|
public class ActiveConnectionRESTService {
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Logger for this class.
|
* Logger for this class.
|
||||||
*/
|
*/
|
||||||
private static final Logger logger = LoggerFactory.getLogger(TunnelRESTService.class);
|
private static final Logger logger = LoggerFactory.getLogger(ActiveConnectionRESTService.class);
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* A service for authenticating users from auth tokens.
|
* A service for authenticating users from auth tokens.
|
||||||
@@ -69,61 +73,78 @@ public class TunnelRESTService {
|
|||||||
private AuthenticationService authenticationService;
|
private AuthenticationService authenticationService;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Retrieves the tunnels of all active connections visible to the current
|
* Gets a list of active connections in the system, filtering the returned
|
||||||
* user.
|
* list by the given permissions, if specified.
|
||||||
*
|
*
|
||||||
* @param authToken
|
* @param authToken
|
||||||
* The authentication token that is used to authenticate the user
|
* The authentication token that is used to authenticate the user
|
||||||
* performing the operation.
|
* performing the operation.
|
||||||
*
|
*
|
||||||
|
* @param permissions
|
||||||
|
* The set of permissions to filter with. A user must have one or more
|
||||||
|
* of these permissions for a user to appear in the result.
|
||||||
|
* If null, no filtering will be performed.
|
||||||
|
*
|
||||||
* @return
|
* @return
|
||||||
* A map of the tunnels of all active connections visible to the
|
* A list of all active connections. If a permission was specified,
|
||||||
* current user, where the key of each entry is the tunnel's UUID.
|
* this list will contain only those active connections for which the
|
||||||
*
|
* current user has that permission.
|
||||||
|
*
|
||||||
* @throws GuacamoleException
|
* @throws GuacamoleException
|
||||||
* If an error occurs while retrieving the tunnels.
|
* If an error is encountered while retrieving active connections.
|
||||||
*/
|
*/
|
||||||
@GET
|
@GET
|
||||||
@Path("/")
|
|
||||||
@AuthProviderRESTExposure
|
@AuthProviderRESTExposure
|
||||||
public Map<String, APITunnel> getTunnels(@QueryParam("token") String authToken)
|
public Map<String, APIActiveConnection> getActiveConnections(@QueryParam("token") String authToken,
|
||||||
|
@QueryParam("permission") List<ObjectPermission.Type> permissions)
|
||||||
throws GuacamoleException {
|
throws GuacamoleException {
|
||||||
|
|
||||||
UserContext userContext = authenticationService.getUserContext(authToken);
|
UserContext userContext = authenticationService.getUserContext(authToken);
|
||||||
|
User self = userContext.self();
|
||||||
|
|
||||||
|
// Do not filter on permissions if no permissions are specified
|
||||||
|
if (permissions != null && permissions.isEmpty())
|
||||||
|
permissions = null;
|
||||||
|
|
||||||
// Retrieve all active tunnels
|
// An admin user has access to any user
|
||||||
Map<String, APITunnel> apiTunnels = new HashMap<String, APITunnel>();
|
SystemPermissionSet systemPermissions = self.getSystemPermissions();
|
||||||
for (ConnectionRecord record : userContext.getActiveConnections()) {
|
boolean isAdmin = systemPermissions.hasPermission(SystemPermission.Type.ADMINISTER);
|
||||||
|
|
||||||
// Locate associated tunnel and UUID
|
// Get the directory
|
||||||
GuacamoleTunnel tunnel = record.getTunnel();
|
Directory<ActiveConnection> activeConnectionDirectory = userContext.getActiveConnectionDirectory();
|
||||||
if (tunnel != null) {
|
|
||||||
APITunnel apiTunnel = new APITunnel(record, tunnel.getUUID().toString());
|
|
||||||
apiTunnels.put(apiTunnel.getUUID(), apiTunnel);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
// Filter users, if requested
|
||||||
|
Collection<String> activeConnectionIdentifiers = activeConnectionDirectory.getIdentifiers();
|
||||||
|
if (!isAdmin && permissions != null) {
|
||||||
|
ObjectPermissionSet activeConnectionPermissions = self.getActiveConnectionPermissions();
|
||||||
|
activeConnectionIdentifiers = activeConnectionPermissions.getAccessibleObjects(permissions, activeConnectionIdentifiers);
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Retrieve all active connections , converting to API active connections
|
||||||
|
Map<String, APIActiveConnection> apiActiveConnections = new HashMap<String, APIActiveConnection>();
|
||||||
|
for (ActiveConnection activeConnection : activeConnectionDirectory.getAll(activeConnectionIdentifiers))
|
||||||
|
apiActiveConnections.put(activeConnection.getIdentifier(), new APIActiveConnection(activeConnection));
|
||||||
|
|
||||||
return apiTunnels;
|
return apiActiveConnections;
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Applies the given tunnel patches. This operation currently only supports
|
* Applies the given active connection patches. This operation currently
|
||||||
* deletion of tunnels through the "remove" patch operation. Deleting a
|
* only supports deletion of active connections through the "remove" patch
|
||||||
* tunnel effectively closing the tunnel and kills the associated
|
* operation. Deleting an active connection effectively kills the
|
||||||
* connection. The path of each patch operation is of the form "/UUID"
|
* connection. The path of each patch operation is of the form "/ID"
|
||||||
* where UUID is the UUID of the tunnel being modified.
|
* where ID is the identifier of the active connection being modified.
|
||||||
*
|
*
|
||||||
* @param authToken
|
* @param authToken
|
||||||
* The authentication token that is used to authenticate the user
|
* The authentication token that is used to authenticate the user
|
||||||
* performing the operation.
|
* performing the operation.
|
||||||
*
|
*
|
||||||
* @param patches
|
* @param patches
|
||||||
* The tunnel patches to apply for this request.
|
* The active connection patches to apply for this request.
|
||||||
*
|
*
|
||||||
* @throws GuacamoleException
|
* @throws GuacamoleException
|
||||||
* If an error occurs while deleting the tunnels.
|
* If an error occurs while deleting the active connections.
|
||||||
*/
|
*/
|
||||||
@PATCH
|
@PATCH
|
||||||
@Path("/")
|
@Path("/")
|
||||||
@@ -131,37 +152,28 @@ public class TunnelRESTService {
|
|||||||
public void patchTunnels(@QueryParam("token") String authToken,
|
public void patchTunnels(@QueryParam("token") String authToken,
|
||||||
List<APIPatch<String>> patches) throws GuacamoleException {
|
List<APIPatch<String>> patches) throws GuacamoleException {
|
||||||
|
|
||||||
// Attempt to get all requested tunnels
|
|
||||||
UserContext userContext = authenticationService.getUserContext(authToken);
|
UserContext userContext = authenticationService.getUserContext(authToken);
|
||||||
|
|
||||||
// Build list of tunnels to delete
|
// Get the directory
|
||||||
Collection<String> tunnelUUIDs = new ArrayList<String>(patches.size());
|
Directory<ActiveConnection> activeConnectionDirectory = userContext.getActiveConnectionDirectory();
|
||||||
|
|
||||||
|
// Close each connection listed for removal
|
||||||
for (APIPatch<String> patch : patches) {
|
for (APIPatch<String> patch : patches) {
|
||||||
|
|
||||||
// Only remove is supported
|
// Only remove is supported
|
||||||
if (patch.getOp() != APIPatch.Operation.remove)
|
if (patch.getOp() != APIPatch.Operation.remove)
|
||||||
throw new GuacamoleUnsupportedException("Only the \"remove\" operation is supported when patching tunnels.");
|
throw new GuacamoleUnsupportedException("Only the \"remove\" operation is supported when patching active connections.");
|
||||||
|
|
||||||
// Retrieve and validate path
|
// Retrieve and validate path
|
||||||
String path = patch.getPath();
|
String path = patch.getPath();
|
||||||
if (!path.startsWith("/"))
|
if (!path.startsWith("/"))
|
||||||
throw new GuacamoleClientException("Patch paths must start with \"/\".");
|
throw new GuacamoleClientException("Patch paths must start with \"/\".");
|
||||||
|
|
||||||
// Add UUID
|
// Close connection
|
||||||
tunnelUUIDs.add(path.substring(1));
|
activeConnectionDirectory.remove(path.substring(1));
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// Close each tunnel, if not already closed
|
|
||||||
Collection<ConnectionRecord> records = userContext.getActiveConnections(tunnelUUIDs);
|
|
||||||
for (ConnectionRecord record : records) {
|
|
||||||
|
|
||||||
GuacamoleTunnel tunnel = record.getTunnel();
|
|
||||||
if (tunnel != null && tunnel.isOpen())
|
|
||||||
tunnel.close();
|
|
||||||
|
|
||||||
}
|
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
}
|
}
|
@@ -56,6 +56,12 @@ public class APIPermissionSet {
|
|||||||
private Map<String, Set<ObjectPermission.Type>> connectionGroupPermissions =
|
private Map<String, Set<ObjectPermission.Type>> connectionGroupPermissions =
|
||||||
new HashMap<String, Set<ObjectPermission.Type>>();
|
new HashMap<String, Set<ObjectPermission.Type>>();
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Map of active connection ID to the set of granted permissions.
|
||||||
|
*/
|
||||||
|
private Map<String, Set<ObjectPermission.Type>> activeConnectionPermissions =
|
||||||
|
new HashMap<String, Set<ObjectPermission.Type>>();
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Map of user ID to the set of granted permissions.
|
* Map of user ID to the set of granted permissions.
|
||||||
*/
|
*/
|
||||||
@@ -149,10 +155,11 @@ public class APIPermissionSet {
|
|||||||
public APIPermissionSet(User user) throws GuacamoleException {
|
public APIPermissionSet(User user) throws GuacamoleException {
|
||||||
|
|
||||||
// Add all permissions from the provided user
|
// Add all permissions from the provided user
|
||||||
addSystemPermissions(systemPermissions, user.getSystemPermissions());
|
addSystemPermissions(systemPermissions, user.getSystemPermissions());
|
||||||
addObjectPermissions(connectionPermissions, user.getConnectionPermissions());
|
addObjectPermissions(connectionPermissions, user.getConnectionPermissions());
|
||||||
addObjectPermissions(connectionGroupPermissions, user.getConnectionGroupPermissions());
|
addObjectPermissions(connectionGroupPermissions, user.getConnectionGroupPermissions());
|
||||||
addObjectPermissions(userPermissions, user.getUserPermissions());
|
addObjectPermissions(activeConnectionPermissions, user.getActiveConnectionPermissions());
|
||||||
|
addObjectPermissions(userPermissions, user.getUserPermissions());
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -186,6 +193,21 @@ public class APIPermissionSet {
|
|||||||
return connectionGroupPermissions;
|
return connectionGroupPermissions;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns a map of active connection IDs to the set of permissions granted
|
||||||
|
* for that active connection. If no permissions are granted to a particular
|
||||||
|
* active connection, its ID will not be present as a key in the map. This
|
||||||
|
* map is mutable, and changes to this map will affect the permission set
|
||||||
|
* directly.
|
||||||
|
*
|
||||||
|
* @return
|
||||||
|
* A map of active connection IDs to the set of permissions granted for
|
||||||
|
* that active connection.
|
||||||
|
*/
|
||||||
|
public Map<String, Set<ObjectPermission.Type>> getActiveConnectionPermissions() {
|
||||||
|
return activeConnectionPermissions;
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns a map of user IDs to the set of permissions granted for that
|
* Returns a map of user IDs to the set of permissions granted for that
|
||||||
* user. If no permissions are granted to a particular user, its ID will
|
* user. If no permissions are granted to a particular user, its ID will
|
||||||
@@ -238,6 +260,19 @@ public class APIPermissionSet {
|
|||||||
this.connectionGroupPermissions = connectionGroupPermissions;
|
this.connectionGroupPermissions = connectionGroupPermissions;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Replaces the current map of active connection permissions with the give
|
||||||
|
* map, which must map active connection ID to its corresponding set of
|
||||||
|
* granted permissions. If an active connection has no permissions, its ID
|
||||||
|
* must not be present as a key in the map.
|
||||||
|
*
|
||||||
|
* @param activeConnectionPermissions
|
||||||
|
* The map which must replace the currently-stored map of permissions.
|
||||||
|
*/
|
||||||
|
public void setActiveConnectionPermissions(Map<String, Set<ObjectPermission.Type>> activeConnectionPermissions) {
|
||||||
|
this.activeConnectionPermissions = activeConnectionPermissions;
|
||||||
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Replaces the current map of user permissions with the given map, which
|
* Replaces the current map of user permissions with the given map, which
|
||||||
* must map user ID to its corresponding set of granted permissions. If a
|
* must map user ID to its corresponding set of granted permissions. If a
|
||||||
|
@@ -95,4 +95,10 @@ public class APIUserWrapper implements User {
|
|||||||
throw new GuacamoleUnsupportedException("APIUserWrapper does not provide permission access.");
|
throw new GuacamoleUnsupportedException("APIUserWrapper does not provide permission access.");
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Override
|
||||||
|
public ObjectPermissionSet getActiveConnectionPermissions()
|
||||||
|
throws GuacamoleException {
|
||||||
|
throw new GuacamoleUnsupportedException("APIUserWrapper does not provide permission access.");
|
||||||
|
}
|
||||||
|
|
||||||
}
|
}
|
||||||
|
@@ -92,6 +92,12 @@ public class UserRESTService {
|
|||||||
*/
|
*/
|
||||||
private static final String CONNECTION_GROUP_PERMISSION_PATCH_PATH_PREFIX = "/connectionGroupPermissions/";
|
private static final String CONNECTION_GROUP_PERMISSION_PATCH_PATH_PREFIX = "/connectionGroupPermissions/";
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The prefix of any path within an operation of a JSON patch which
|
||||||
|
* modifies the permissions of a user regarding a specific active connection.
|
||||||
|
*/
|
||||||
|
private static final String ACTIVE_CONNECTION_PERMISSION_PATCH_PATH_PREFIX = "/activeConnectionPermissions/";
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The prefix of any path within an operation of a JSON patch which
|
* The prefix of any path within an operation of a JSON patch which
|
||||||
* modifies the permissions of a user regarding another, specific user.
|
* modifies the permissions of a user regarding another, specific user.
|
||||||
@@ -503,10 +509,11 @@ public class UserRESTService {
|
|||||||
throw new GuacamoleResourceNotFoundException("No such user: \"" + username + "\"");
|
throw new GuacamoleResourceNotFoundException("No such user: \"" + username + "\"");
|
||||||
|
|
||||||
// Permission patches for all types of permissions
|
// Permission patches for all types of permissions
|
||||||
PermissionSetPatch<ObjectPermission> connectionPermissionPatch = new PermissionSetPatch<ObjectPermission>();
|
PermissionSetPatch<ObjectPermission> connectionPermissionPatch = new PermissionSetPatch<ObjectPermission>();
|
||||||
PermissionSetPatch<ObjectPermission> connectionGroupPermissionPatch = new PermissionSetPatch<ObjectPermission>();
|
PermissionSetPatch<ObjectPermission> connectionGroupPermissionPatch = new PermissionSetPatch<ObjectPermission>();
|
||||||
PermissionSetPatch<ObjectPermission> userPermissionPatch = new PermissionSetPatch<ObjectPermission>();
|
PermissionSetPatch<ObjectPermission> activeConnectionPermissionPatch = new PermissionSetPatch<ObjectPermission>();
|
||||||
PermissionSetPatch<SystemPermission> systemPermissionPatch = new PermissionSetPatch<SystemPermission>();
|
PermissionSetPatch<ObjectPermission> userPermissionPatch = new PermissionSetPatch<ObjectPermission>();
|
||||||
|
PermissionSetPatch<SystemPermission> systemPermissionPatch = new PermissionSetPatch<SystemPermission>();
|
||||||
|
|
||||||
// Apply all patch operations individually
|
// Apply all patch operations individually
|
||||||
for (APIPatch<String> patch : patches) {
|
for (APIPatch<String> patch : patches) {
|
||||||
@@ -539,6 +546,19 @@ public class UserRESTService {
|
|||||||
|
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Create active connection permission if path has active connection prefix
|
||||||
|
else if (path.startsWith(ACTIVE_CONNECTION_PERMISSION_PATCH_PATH_PREFIX)) {
|
||||||
|
|
||||||
|
// Get identifier and type from patch operation
|
||||||
|
String identifier = path.substring(ACTIVE_CONNECTION_PERMISSION_PATCH_PATH_PREFIX.length());
|
||||||
|
ObjectPermission.Type type = ObjectPermission.Type.valueOf(patch.getValue());
|
||||||
|
|
||||||
|
// Create and update corresponding permission
|
||||||
|
ObjectPermission permission = new ObjectPermission(type, identifier);
|
||||||
|
updatePermissionSet(patch.getOp(), activeConnectionPermissionPatch, permission);
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
// Create user permission if path has user prefix
|
// Create user permission if path has user prefix
|
||||||
else if (path.startsWith(USER_PERMISSION_PATCH_PATH_PREFIX)) {
|
else if (path.startsWith(USER_PERMISSION_PATCH_PATH_PREFIX)) {
|
||||||
|
|
||||||
@@ -573,6 +593,7 @@ public class UserRESTService {
|
|||||||
// Save the permission changes
|
// Save the permission changes
|
||||||
connectionPermissionPatch.apply(user.getConnectionPermissions());
|
connectionPermissionPatch.apply(user.getConnectionPermissions());
|
||||||
connectionGroupPermissionPatch.apply(user.getConnectionGroupPermissions());
|
connectionGroupPermissionPatch.apply(user.getConnectionGroupPermissions());
|
||||||
|
activeConnectionPermissionPatch.apply(user.getActiveConnectionPermissions());
|
||||||
userPermissionPatch.apply(user.getUserPermissions());
|
userPermissionPatch.apply(user.getUserPermissions());
|
||||||
systemPermissionPatch.apply(user.getSystemPermissions());
|
systemPermissionPatch.apply(user.getSystemPermissions());
|
||||||
|
|
||||||
|
@@ -27,15 +27,15 @@ angular.module('manage').controller('manageSessionsController', ['$scope', '$inj
|
|||||||
function manageSessionsController($scope, $injector) {
|
function manageSessionsController($scope, $injector) {
|
||||||
|
|
||||||
// Required types
|
// Required types
|
||||||
var ActiveTunnelWrapper = $injector.get('ActiveTunnelWrapper');
|
var ActiveConnectionWrapper = $injector.get('ActiveConnectionWrapper');
|
||||||
var ConnectionGroup = $injector.get('ConnectionGroup');
|
var ConnectionGroup = $injector.get('ConnectionGroup');
|
||||||
|
|
||||||
// Required services
|
// Required services
|
||||||
var authenticationService = $injector.get('authenticationService');
|
var activeConnectionService = $injector.get('activeConnectionService');
|
||||||
var connectionGroupService = $injector.get('connectionGroupService');
|
var authenticationService = $injector.get('authenticationService');
|
||||||
var guacNotification = $injector.get('guacNotification');
|
var connectionGroupService = $injector.get('connectionGroupService');
|
||||||
var permissionService = $injector.get('permissionService');
|
var guacNotification = $injector.get('guacNotification');
|
||||||
var tunnelService = $injector.get('tunnelService');
|
var permissionService = $injector.get('permissionService');
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The root connection group of the connection group hierarchy.
|
* The root connection group of the connection group hierarchy.
|
||||||
@@ -53,10 +53,10 @@ angular.module('manage').controller('manageSessionsController', ['$scope', '$inj
|
|||||||
$scope.permissions = null;
|
$scope.permissions = null;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The ActiveTunnelWrappers of all active sessions accessible by the current
|
* The ActiveConnectionWrappers of all active sessions accessible by the
|
||||||
* user, or null if the tunnels have not yet been loaded.
|
* current user, or null if the active sessions have not yet been loaded.
|
||||||
*
|
*
|
||||||
* @type ActiveTunnelWrapper[]
|
* @type ActiveConnectionWrapper[]
|
||||||
*/
|
*/
|
||||||
$scope.wrappers = null;
|
$scope.wrappers = null;
|
||||||
|
|
||||||
@@ -74,9 +74,9 @@ angular.module('manage').controller('manageSessionsController', ['$scope', '$inj
|
|||||||
$scope.connections = {};
|
$scope.connections = {};
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Map of all currently-selected tunnel wrappers by UUID.
|
* Map of all currently-selected active connection wrappers by identifier.
|
||||||
*
|
*
|
||||||
* @type Object.<String, ActiveTunnelWrapper>
|
* @type Object.<String, ActiveConnectionWrapper>
|
||||||
*/
|
*/
|
||||||
var selectedWrappers = {};
|
var selectedWrappers = {};
|
||||||
|
|
||||||
@@ -122,12 +122,12 @@ angular.module('manage').controller('manageSessionsController', ['$scope', '$inj
|
|||||||
});
|
});
|
||||||
|
|
||||||
// Query active sessions
|
// Query active sessions
|
||||||
tunnelService.getActiveTunnels().success(function sessionsRetrieved(tunnels) {
|
activeConnectionService.getActiveConnections().success(function sessionsRetrieved(activeConnections) {
|
||||||
|
|
||||||
// Wrap all active tunnels for sake of display
|
// Wrap all active connections for sake of display
|
||||||
$scope.wrappers = [];
|
$scope.wrappers = [];
|
||||||
for (var tunnelUUID in tunnels) {
|
for (var identifier in activeConnections) {
|
||||||
$scope.wrappers.push(new ActiveTunnelWrapper(tunnels[tunnelUUID]));
|
$scope.wrappers.push(new ActiveConnectionWrapper(activeConnections[identifier]));
|
||||||
}
|
}
|
||||||
|
|
||||||
});
|
});
|
||||||
@@ -192,12 +192,12 @@ angular.module('manage').controller('manageSessionsController', ['$scope', '$inj
|
|||||||
var deleteSessionsImmediately = function deleteSessionsImmediately() {
|
var deleteSessionsImmediately = function deleteSessionsImmediately() {
|
||||||
|
|
||||||
// Perform deletion
|
// Perform deletion
|
||||||
tunnelService.deleteActiveTunnels(Object.keys(selectedWrappers))
|
activeConnectionService.deleteActiveConnections(Object.keys(selectedWrappers))
|
||||||
.success(function tunnelsDeleted() {
|
.success(function activeConnectionsDeleted() {
|
||||||
|
|
||||||
// Remove deleted tunnels from wrapper array
|
// Remove deleted connections from wrapper array
|
||||||
$scope.wrappers = $scope.wrappers.filter(function tunnelStillExists(wrapper) {
|
$scope.wrappers = $scope.wrappers.filter(function activeConnectionStillExists(wrapper) {
|
||||||
return !(wrapper.tunnel.uuid in selectedWrappers);
|
return !(wrapper.activeConnection.identifier in selectedWrappers);
|
||||||
});
|
});
|
||||||
|
|
||||||
// Clear selection
|
// Clear selection
|
||||||
@@ -206,7 +206,7 @@ angular.module('manage').controller('manageSessionsController', ['$scope', '$inj
|
|||||||
})
|
})
|
||||||
|
|
||||||
// Notify of any errors
|
// Notify of any errors
|
||||||
.error(function tunnelDeletionFailed(error) {
|
.error(function activeConnectionDeletionFailed(error) {
|
||||||
guacNotification.showStatus({
|
guacNotification.showStatus({
|
||||||
'className' : 'error',
|
'className' : 'error',
|
||||||
'title' : 'MANAGE_SESSION.DIALOG_HEADER_ERROR',
|
'title' : 'MANAGE_SESSION.DIALOG_HEADER_ERROR',
|
||||||
@@ -239,7 +239,7 @@ angular.module('manage').controller('manageSessionsController', ['$scope', '$inj
|
|||||||
$scope.canDeleteSessions = function canDeleteSessions() {
|
$scope.canDeleteSessions = function canDeleteSessions() {
|
||||||
|
|
||||||
// We can delete sessions if at least one is selected
|
// We can delete sessions if at least one is selected
|
||||||
for (var tunnelUUID in selectedWrappers)
|
for (var identifier in selectedWrappers)
|
||||||
return true;
|
return true;
|
||||||
|
|
||||||
return false;
|
return false;
|
||||||
@@ -247,20 +247,20 @@ angular.module('manage').controller('manageSessionsController', ['$scope', '$inj
|
|||||||
};
|
};
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Called whenever a tunnel wrapper changes selected status.
|
* Called whenever an active connection wrapper changes selected status.
|
||||||
*
|
*
|
||||||
* @param {ActiveTunnelWrapper} wrapper
|
* @param {ActiveConnectionWrapper} wrapper
|
||||||
* The wrapper whose selected status has changed.
|
* The wrapper whose selected status has changed.
|
||||||
*/
|
*/
|
||||||
$scope.wrapperSelectionChange = function wrapperSelectionChange(wrapper) {
|
$scope.wrapperSelectionChange = function wrapperSelectionChange(wrapper) {
|
||||||
|
|
||||||
// Add wrapper to map if selected
|
// Add wrapper to map if selected
|
||||||
if (wrapper.checked)
|
if (wrapper.checked)
|
||||||
selectedWrappers[wrapper.tunnel.uuid] = wrapper;
|
selectedWrappers[wrapper.activeConnection.identifier] = wrapper;
|
||||||
|
|
||||||
// Otherwise, remove wrapper from map
|
// Otherwise, remove wrapper from map
|
||||||
else
|
else
|
||||||
delete selectedWrappers[wrapper.tunnel.uuid];
|
delete selectedWrappers[wrapper.activeConnection.identifier];
|
||||||
|
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@@ -52,10 +52,10 @@ THE SOFTWARE.
|
|||||||
<td class="select-session">
|
<td class="select-session">
|
||||||
<input ng-change="wrapperSelectionChange(wrapper)" type="checkbox" ng-model="wrapper.checked" />
|
<input ng-change="wrapperSelectionChange(wrapper)" type="checkbox" ng-model="wrapper.checked" />
|
||||||
</td>
|
</td>
|
||||||
<td>{{wrapper.tunnel.username}}</td>
|
<td>{{wrapper.activeConnection.username}}</td>
|
||||||
<td>{{wrapper.tunnel.startDate | date:'short'}}</td>
|
<td>{{wrapper.activeConnection.startDate | date:'short'}}</td>
|
||||||
<td>{{wrapper.tunnel.remoteHost}}</td>
|
<td>{{wrapper.activeConnection.remoteHost}}</td>
|
||||||
<td>{{connections[wrapper.tunnel.identifier].name}}</td>
|
<td>{{connections[wrapper.activeConnection.connectionIdentifier].name}}</td>
|
||||||
</tr>
|
</tr>
|
||||||
</tbody>
|
</tbody>
|
||||||
</table>
|
</table>
|
||||||
|
@@ -21,30 +21,30 @@
|
|||||||
*/
|
*/
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* A service for defining the ActiveTunnelWrapper class.
|
* A service for defining the ActiveConnectionWrapper class.
|
||||||
*/
|
*/
|
||||||
angular.module('manage').factory('ActiveTunnelWrapper', [
|
angular.module('manage').factory('ActiveConnectionWrapper', [
|
||||||
function defineActiveTunnelWrapper() {
|
function defineActiveConnectionWrapper() {
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Wrapper for ActiveTunnel which adds display-specific
|
* Wrapper for ActiveConnection which adds display-specific
|
||||||
* properties, such as a checked option.
|
* properties, such as a checked option.
|
||||||
*
|
*
|
||||||
* @constructor
|
* @constructor
|
||||||
* @param {ActiveTunnel} activeTunnel
|
* @param {ActiveConnection} activeConnection
|
||||||
* The ActiveTunnel to wrap.
|
* The ActiveConnection to wrap.
|
||||||
*/
|
*/
|
||||||
var ActiveTunnelWrapper = function ActiveTunnelWrapper(activeTunnel) {
|
var ActiveConnectionWrapper = function ActiveConnectionWrapper(activeConnection) {
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The wrapped ActiveTunnel.
|
* The wrapped ActiveConnection.
|
||||||
*
|
*
|
||||||
* @type ActiveTunnel
|
* @type ActiveConnection
|
||||||
*/
|
*/
|
||||||
this.tunnel = activeTunnel;
|
this.activeConnection = activeConnection;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* A flag indicating that the tunnel has been selected.
|
* A flag indicating that the active connection has been selected.
|
||||||
*
|
*
|
||||||
* @type Boolean
|
* @type Boolean
|
||||||
*/
|
*/
|
||||||
@@ -52,6 +52,6 @@ angular.module('manage').factory('ActiveTunnelWrapper', [
|
|||||||
|
|
||||||
};
|
};
|
||||||
|
|
||||||
return ActiveTunnelWrapper;
|
return ActiveConnectionWrapper;
|
||||||
|
|
||||||
}]);
|
}]);
|
@@ -1,5 +1,5 @@
|
|||||||
/*
|
/*
|
||||||
* Copyright (C) 2014 Glyptodon LLC
|
* Copyright (C) 2015 Glyptodon LLC
|
||||||
*
|
*
|
||||||
* Permission is hereby granted, free of charge, to any person obtaining a copy
|
* Permission is hereby granted, free of charge, to any person obtaining a copy
|
||||||
* of this software and associated documentation files (the "Software"), to deal
|
* of this software and associated documentation files (the "Software"), to deal
|
||||||
@@ -21,72 +21,84 @@
|
|||||||
*/
|
*/
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Service for operating on tunnels via the REST API.
|
* Service for operating on active connections via the REST API.
|
||||||
*/
|
*/
|
||||||
angular.module('rest').factory('tunnelService', ['$http', 'authenticationService',
|
angular.module('rest').factory('activeConnectionService', ['$http', 'authenticationService',
|
||||||
function tunnelService($http, authenticationService) {
|
function activeConnectionService($http, authenticationService) {
|
||||||
|
|
||||||
var service = {};
|
var service = {};
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Makes a request to the REST API to get the list of active tunnels,
|
* Makes a request to the REST API to get the list of active tunnels,
|
||||||
* returning a promise that provides a map of @link{ActiveTunnel}
|
* returning a promise that provides a map of @link{ActiveConnection}
|
||||||
* objects if successful.
|
* objects if successful.
|
||||||
*
|
*
|
||||||
* @returns {Promise.<Object.<String, ActiveTunnel>>}
|
* @param {String[]} [permissionTypes]
|
||||||
* A promise which will resolve with a map of @link{ActiveTunnel}
|
* The set of permissions to filter with. A user must have one or more
|
||||||
* objects, where each key is the UUID of the corresponding tunnel.
|
* of these permissions for an active connection to appear in the
|
||||||
|
* result. If null, no filtering will be performed. Valid values are
|
||||||
|
* listed within PermissionSet.ObjectType.
|
||||||
|
*
|
||||||
|
|
||||||
|
* @returns {Promise.<Object.<String, ActiveConnection>>}
|
||||||
|
* A promise which will resolve with a map of @link{ActiveConnection}
|
||||||
|
* objects, where each key is the identifier of the corresponding
|
||||||
|
* active connection.
|
||||||
*/
|
*/
|
||||||
service.getActiveTunnels = function getActiveTunnels() {
|
service.getActiveConnections = function getActiveConnections(permissionTypes) {
|
||||||
|
|
||||||
// Build HTTP parameters set
|
// Build HTTP parameters set
|
||||||
var httpParameters = {
|
var httpParameters = {
|
||||||
token : authenticationService.getCurrentToken()
|
token : authenticationService.getCurrentToken()
|
||||||
};
|
};
|
||||||
|
|
||||||
|
// Add permission filter if specified
|
||||||
|
if (permissionTypes)
|
||||||
|
httpParameters.permission = permissionTypes;
|
||||||
|
|
||||||
// Retrieve tunnels
|
// Retrieve tunnels
|
||||||
return $http({
|
return $http({
|
||||||
method : 'GET',
|
method : 'GET',
|
||||||
url : 'api/tunnels',
|
url : 'api/activeConnections',
|
||||||
params : httpParameters
|
params : httpParameters
|
||||||
});
|
});
|
||||||
|
|
||||||
};
|
};
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Makes a request to the REST API to delete the tunnels having the given
|
* Makes a request to the REST API to delete the active connections having
|
||||||
* UUIDs, effectively disconnecting the tunnels, returning a promise that
|
* the given identifiers, effectively disconnecting them, returning a
|
||||||
* can be used for processing the results of the call.
|
* promise that can be used for processing the results of the call.
|
||||||
*
|
*
|
||||||
* @param {String[]} uuids
|
* @param {String[]} identifiers
|
||||||
* The UUIDs of the tunnels to delete.
|
* The identifiers of the active connections to delete.
|
||||||
*
|
*
|
||||||
* @returns {Promise}
|
* @returns {Promise}
|
||||||
* A promise for the HTTP call which will succeed if and only if the
|
* A promise for the HTTP call which will succeed if and only if the
|
||||||
* delete operation is successful.
|
* delete operation is successful.
|
||||||
*/
|
*/
|
||||||
service.deleteActiveTunnels = function deleteActiveTunnels(uuids) {
|
service.deleteActiveConnections = function deleteActiveConnections(identifiers) {
|
||||||
|
|
||||||
// Build HTTP parameters set
|
// Build HTTP parameters set
|
||||||
var httpParameters = {
|
var httpParameters = {
|
||||||
token : authenticationService.getCurrentToken()
|
token : authenticationService.getCurrentToken()
|
||||||
};
|
};
|
||||||
|
|
||||||
// Convert provided array of UUIDs to a patch
|
// Convert provided array of identifiers to a patch
|
||||||
var tunnelPatch = [];
|
var activeConnectionPatch = [];
|
||||||
uuids.forEach(function addTunnelPatch(uuid) {
|
identifiers.forEach(function addActiveConnectionPatch(identifier) {
|
||||||
tunnelPatch.push({
|
activeConnectionPatch.push({
|
||||||
op : 'remove',
|
op : 'remove',
|
||||||
path : '/' + uuid
|
path : '/' + identifier
|
||||||
});
|
});
|
||||||
});
|
});
|
||||||
|
|
||||||
// Perform tunnel deletion via PATCH
|
// Perform active connection deletion via PATCH
|
||||||
return $http({
|
return $http({
|
||||||
method : 'PATCH',
|
method : 'PATCH',
|
||||||
url : 'api/tunnels',
|
url : 'api/activeConnections',
|
||||||
params : httpParameters,
|
params : httpParameters,
|
||||||
data : tunnelPatch
|
data : activeConnectionPatch
|
||||||
});
|
});
|
||||||
|
|
||||||
};
|
};
|
@@ -153,6 +153,10 @@ angular.module('rest').factory('permissionService', ['$http', 'authenticationSer
|
|||||||
addObjectPatchOperations(patch, operation, "/connectionGroupPermissions",
|
addObjectPatchOperations(patch, operation, "/connectionGroupPermissions",
|
||||||
permissions.connectionGroupPermissions);
|
permissions.connectionGroupPermissions);
|
||||||
|
|
||||||
|
// Add active connection permission operations to patch
|
||||||
|
addObjectPatchOperations(patch, operation, "/activeConnectionPermissions",
|
||||||
|
permissions.activeConnectionPermissions);
|
||||||
|
|
||||||
// Add user permission operations to patch
|
// Add user permission operations to patch
|
||||||
addObjectPatchOperations(patch, operation, "/userPermissions",
|
addObjectPatchOperations(patch, operation, "/userPermissions",
|
||||||
permissions.userPermissions);
|
permissions.userPermissions);
|
||||||
|
@@ -21,34 +21,44 @@
|
|||||||
*/
|
*/
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Service which defines the ActiveTunnel class.
|
* Service which defines the ActiveConnection class.
|
||||||
*/
|
*/
|
||||||
angular.module('rest').factory('ActiveTunnel', [function defineActiveTunnel() {
|
angular.module('rest').factory('ActiveConnection', [function defineActiveConnection() {
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The object returned by REST API calls when representing the data
|
* The object returned by REST API calls when representing the data
|
||||||
* associated with an active tunnel. Each tunnel denotes an active
|
* associated with an active connection. Each active connection is
|
||||||
* connection, uniquely identified by the tunnel UUID.
|
* effectively a pairing of a connection and the user currently using it,
|
||||||
|
* along with other information.
|
||||||
*
|
*
|
||||||
* @constructor
|
* @constructor
|
||||||
* @param {ActiveTunnel|Object} [template={}]
|
* @param {ActiveConnection|Object} [template={}]
|
||||||
* The object whose properties should be copied within the new
|
* The object whose properties should be copied within the new
|
||||||
* ActiveTunnel.
|
* ActiveConnection.
|
||||||
*/
|
*/
|
||||||
var ActiveTunnel = function ActiveTunnel(template) {
|
var ActiveConnection = function ActiveConnection(template) {
|
||||||
|
|
||||||
// Use empty object by default
|
// Use empty object by default
|
||||||
template = template || {};
|
template = template || {};
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The identifier of the connection associated with this tunnel.
|
* The identifier which uniquely identifies this specific active
|
||||||
*
|
* connection.
|
||||||
|
*
|
||||||
* @type String
|
* @type String
|
||||||
*/
|
*/
|
||||||
this.identifier = template.identifier;
|
this.identifier = template.identifier;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The time that the tunnel began, in seconds since
|
* The identifier of the connection associated with this active
|
||||||
|
* connection.
|
||||||
|
*
|
||||||
|
* @type String
|
||||||
|
*/
|
||||||
|
this.connectionIdentifier = template.connectionIdentifier;
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The time that the connection began, in seconds since
|
||||||
* 1970-01-01 00:00:00 UTC.
|
* 1970-01-01 00:00:00 UTC.
|
||||||
*
|
*
|
||||||
* @type Number
|
* @type Number
|
||||||
@@ -56,28 +66,21 @@ angular.module('rest').factory('ActiveTunnel', [function defineActiveTunnel() {
|
|||||||
this.startDate = template.startDate;
|
this.startDate = template.startDate;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The remote host that initiated the tunnel, if known.
|
* The remote host that initiated the connection, if known.
|
||||||
*
|
*
|
||||||
* @type String
|
* @type String
|
||||||
*/
|
*/
|
||||||
this.remoteHost = template.remoteHost;
|
this.remoteHost = template.remoteHost;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The username of the user associated with the tunnel.
|
* The username of the user associated with the connection.
|
||||||
*
|
*
|
||||||
* @type String
|
* @type String
|
||||||
*/
|
*/
|
||||||
this.username = template.username;
|
this.username = template.username;
|
||||||
|
|
||||||
/**
|
|
||||||
* The UUID which uniquely identifies the tunnel.
|
|
||||||
*
|
|
||||||
* @type String
|
|
||||||
*/
|
|
||||||
this.uuid = template.uuid;
|
|
||||||
|
|
||||||
};
|
};
|
||||||
|
|
||||||
return ActiveTunnel;
|
return ActiveConnection;
|
||||||
|
|
||||||
}]);
|
}]);
|
@@ -90,6 +90,25 @@ angular.module('rest').factory('PermissionFlagSet', ['PermissionSet',
|
|||||||
'ADMINISTER' : {}
|
'ADMINISTER' : {}
|
||||||
};
|
};
|
||||||
|
|
||||||
|
/**
|
||||||
|
* The granted state of each permission for each active connection, as
|
||||||
|
* a map of object permission type string to permission map. The
|
||||||
|
* permission map is, in turn, a map of active connection identifier to
|
||||||
|
* boolean value. A particular permission is granted if its
|
||||||
|
* corresponding boolean value is set to true. Valid permission type
|
||||||
|
* strings are defined within PermissionSet.ObjectPermissionType.
|
||||||
|
* Permissions which are not granted may be set to false, but this is
|
||||||
|
* not required.
|
||||||
|
*
|
||||||
|
* @type Object.<String, Object.<String, Boolean>>
|
||||||
|
*/
|
||||||
|
this.activeConnectionPermissions = template.activeConnectionPermissions || {
|
||||||
|
'READ' : {},
|
||||||
|
'UPDATE' : {},
|
||||||
|
'DELETE' : {},
|
||||||
|
'ADMINISTER' : {}
|
||||||
|
};
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* The granted state of each permission for each user, as a map of
|
* The granted state of each permission for each user, as a map of
|
||||||
* object permission type string to permission map. The permission map
|
* object permission type string to permission map. The permission map
|
||||||
@@ -110,6 +129,20 @@ angular.module('rest').factory('PermissionFlagSet', ['PermissionSet',
|
|||||||
|
|
||||||
};
|
};
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Iterates through all permissions in the given permission map, setting
|
||||||
|
* the corresponding permission flags in the given permission flag map.
|
||||||
|
*
|
||||||
|
* @param {Object.<String, String[]>} permMap
|
||||||
|
* Map of object identifiers to the set of granted permissions. Each
|
||||||
|
* permission is represented by a string listed within
|
||||||
|
* PermissionSet.ObjectPermissionType.
|
||||||
|
*
|
||||||
|
* @param {Object.<String, Object.<String, Boolean>>} flagMap
|
||||||
|
* Map of permission type strings to identifier/flag pairs representing
|
||||||
|
* whether the permission of that type is granted for the object having
|
||||||
|
* having the associated identifier.
|
||||||
|
*/
|
||||||
var addObjectPermissions = function addObjectPermissions(permMap, flagMap) {
|
var addObjectPermissions = function addObjectPermissions(permMap, flagMap) {
|
||||||
|
|
||||||
// For each defined identifier in the permission map
|
// For each defined identifier in the permission map
|
||||||
@@ -158,6 +191,9 @@ angular.module('rest').factory('PermissionFlagSet', ['PermissionSet',
|
|||||||
// Add all granted connection group permissions
|
// Add all granted connection group permissions
|
||||||
addObjectPermissions(permissionSet.connectionGroupPermissions, permissionFlagSet.connectionGroupPermissions);
|
addObjectPermissions(permissionSet.connectionGroupPermissions, permissionFlagSet.connectionGroupPermissions);
|
||||||
|
|
||||||
|
// Add all granted active connection permissions
|
||||||
|
addObjectPermissions(permissionSet.activeConnectionPermissions, permissionFlagSet.activeConnectionPermissions);
|
||||||
|
|
||||||
// Add all granted user permissions
|
// Add all granted user permissions
|
||||||
addObjectPermissions(permissionSet.userPermissions, permissionFlagSet.userPermissions);
|
addObjectPermissions(permissionSet.userPermissions, permissionFlagSet.userPermissions);
|
||||||
|
|
||||||
|
@@ -57,6 +57,15 @@ angular.module('rest').factory('PermissionSet', [function definePermissionSet()
|
|||||||
*/
|
*/
|
||||||
this.connectionGroupPermissions = template.connectionGroupPermissions || {};
|
this.connectionGroupPermissions = template.connectionGroupPermissions || {};
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Map of active connection identifiers to the corresponding array of
|
||||||
|
* granted permissions. Each permission is represented by a string
|
||||||
|
* listed within PermissionSet.ObjectPermissionType.
|
||||||
|
*
|
||||||
|
* @type Object.<String, String[]>
|
||||||
|
*/
|
||||||
|
this.activeConnectionPermissions = template.activeConnectionPermissions || {};
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Map of user identifiers to the corresponding array of granted
|
* Map of user identifiers to the corresponding array of granted
|
||||||
* permissions. Each permission is represented by a string listed
|
* permissions. Each permission is represented by a string listed
|
||||||
@@ -237,6 +246,28 @@ angular.module('rest').factory('PermissionSet', [function definePermissionSet()
|
|||||||
return hasPermission(permSet.connectionGroupPermissions, type, identifier);
|
return hasPermission(permSet.connectionGroupPermissions, type, identifier);
|
||||||
};
|
};
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Returns whether the given permission is granted for the active
|
||||||
|
* connection having the given ID.
|
||||||
|
*
|
||||||
|
* @param {PermissionSet|Object} permSet
|
||||||
|
* The permission set to check.
|
||||||
|
*
|
||||||
|
* @param {String} type
|
||||||
|
* The permission to search for, as defined by
|
||||||
|
* PermissionSet.ObjectPermissionType.
|
||||||
|
*
|
||||||
|
* @param {String} identifier
|
||||||
|
* The identifier of the active connection to which the permission
|
||||||
|
* applies.
|
||||||
|
*
|
||||||
|
* @returns {Boolean}
|
||||||
|
* true if the permission is present (granted), false otherwise.
|
||||||
|
*/
|
||||||
|
PermissionSet.hasActiveConnectionPermission = function hasActiveConnectionPermission(permSet, type, identifier) {
|
||||||
|
return hasPermission(permSet.activeConnectionPermissions, type, identifier);
|
||||||
|
};
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Returns whether the given permission is granted for the user having the
|
* Returns whether the given permission is granted for the user having the
|
||||||
* given ID.
|
* given ID.
|
||||||
@@ -507,6 +538,55 @@ angular.module('rest').factory('PermissionSet', [function definePermissionSet()
|
|||||||
return removeObjectPermission(permSet.connectionGroupPermissions, type, identifier);
|
return removeObjectPermission(permSet.connectionGroupPermissions, type, identifier);
|
||||||
};
|
};
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Adds the given active connection permission applying to the connection
|
||||||
|
* group with the given ID to the given permission set, if not already
|
||||||
|
* present. If the permission is already present, this function has no
|
||||||
|
* effect.
|
||||||
|
*
|
||||||
|
* @param {PermissionSet} permSet
|
||||||
|
* The permission set to modify.
|
||||||
|
*
|
||||||
|
* @param {String} type
|
||||||
|
* The permission to add, as defined by
|
||||||
|
* PermissionSet.ObjectPermissionType.
|
||||||
|
*
|
||||||
|
* @param {String} identifier
|
||||||
|
* The identifier of the active connection to which the permission
|
||||||
|
* applies.
|
||||||
|
*
|
||||||
|
* @returns {Boolean}
|
||||||
|
* true if the permission was added, false if the permission was
|
||||||
|
* already present in the given permission set.
|
||||||
|
*/
|
||||||
|
PermissionSet.addActiveConnectionPermission = function addActiveConnectionPermission(permSet, type, identifier) {
|
||||||
|
return addObjectPermission(permSet.activeConnectionPermissions, type, identifier);
|
||||||
|
};
|
||||||
|
|
||||||
|
/**
|
||||||
|
* Removes the given active connection permission applying to the
|
||||||
|
* connection group with the given ID from the given permission set, if
|
||||||
|
* present. If the permission is not present, this function has no effect.
|
||||||
|
*
|
||||||
|
* @param {PermissionSet} permSet
|
||||||
|
* The permission set to modify.
|
||||||
|
*
|
||||||
|
* @param {String} type
|
||||||
|
* The permission to remove, as defined by
|
||||||
|
* PermissionSet.ObjectPermissionType.
|
||||||
|
*
|
||||||
|
* @param {String} identifier
|
||||||
|
* The identifier of the active connection to which the permission
|
||||||
|
* applies.
|
||||||
|
*
|
||||||
|
* @returns {Boolean}
|
||||||
|
* true if the permission was removed, false if the permission was not
|
||||||
|
* present in the given permission set.
|
||||||
|
*/
|
||||||
|
PermissionSet.removeActiveConnectionPermission = function removeActiveConnectionPermission(permSet, type, identifier) {
|
||||||
|
return removeObjectPermission(permSet.activeConnectionPermissions, type, identifier);
|
||||||
|
};
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Adds the given user permission applying to the user with the given ID to
|
* Adds the given user permission applying to the user with the given ID to
|
||||||
* the given permission set, if not already present. If the permission is
|
* the given permission set, if not already present. If the permission is
|
||||||
|
Reference in New Issue
Block a user