mirror of
https://github.com/scm-manager/scm-manager.git
synced 2025-11-14 17:26:22 +01:00
remove GroupNames and ExternalGroupNames in favor of GroupCollector
This commit is contained in:
@@ -1,22 +0,0 @@
|
|||||||
package sonia.scm.group;
|
|
||||||
|
|
||||||
import java.util.Collection;
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This class represents all associated groups which are provided by external systems for a certain user.
|
|
||||||
*
|
|
||||||
* @author Sebastian Sdorra
|
|
||||||
* @since 2.0.0
|
|
||||||
*/
|
|
||||||
public class ExternalGroupNames extends GroupNames {
|
|
||||||
public ExternalGroupNames() {
|
|
||||||
}
|
|
||||||
|
|
||||||
public ExternalGroupNames(String groupName, String... groupNames) {
|
|
||||||
super(groupName, groupNames);
|
|
||||||
}
|
|
||||||
|
|
||||||
public ExternalGroupNames(Collection<String> collection) {
|
|
||||||
super(collection);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -1,187 +0,0 @@
|
|||||||
/**
|
|
||||||
* Copyright (c) 2010, Sebastian Sdorra
|
|
||||||
* All rights reserved.
|
|
||||||
*
|
|
||||||
* Redistribution and use in source and binary forms, with or without
|
|
||||||
* modification, are permitted provided that the following conditions are met:
|
|
||||||
*
|
|
||||||
* 1. Redistributions of source code must retain the above copyright notice,
|
|
||||||
* this list of conditions and the following disclaimer.
|
|
||||||
* 2. Redistributions in binary form must reproduce the above copyright notice,
|
|
||||||
* this list of conditions and the following disclaimer in the documentation
|
|
||||||
* and/or other materials provided with the distribution.
|
|
||||||
* 3. Neither the name of SCM-Manager; nor the names of its
|
|
||||||
* contributors may be used to endorse or promote products derived from this
|
|
||||||
* software without specific prior written permission.
|
|
||||||
*
|
|
||||||
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
|
||||||
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
||||||
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
|
|
||||||
* DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE FOR ANY
|
|
||||||
* DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
|
|
||||||
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
|
||||||
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
|
|
||||||
* ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
||||||
* (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
|
|
||||||
* SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
||||||
*
|
|
||||||
* http://bitbucket.org/sdorra/scm-manager
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
package sonia.scm.group;
|
|
||||||
|
|
||||||
//~--- non-JDK imports --------------------------------------------------------
|
|
||||||
|
|
||||||
import com.google.common.base.Joiner;
|
|
||||||
import com.google.common.base.Objects;
|
|
||||||
import com.google.common.collect.Lists;
|
|
||||||
|
|
||||||
import java.io.Serializable;
|
|
||||||
import java.util.Collection;
|
|
||||||
import java.util.Collections;
|
|
||||||
import java.util.Iterator;
|
|
||||||
|
|
||||||
//~--- JDK imports ------------------------------------------------------------
|
|
||||||
|
|
||||||
/**
|
|
||||||
* This class represents all associated groups for a user.
|
|
||||||
*
|
|
||||||
* @author Sebastian Sdorra
|
|
||||||
* @since 1.21
|
|
||||||
*/
|
|
||||||
public class GroupNames implements Serializable, Iterable<String>
|
|
||||||
{
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Group for all authenticated users
|
|
||||||
* @since 1.31
|
|
||||||
*/
|
|
||||||
public static final String AUTHENTICATED = "_authenticated";
|
|
||||||
|
|
||||||
/** Field description */
|
|
||||||
private static final long serialVersionUID = 8615685985213897947L;
|
|
||||||
|
|
||||||
//~--- constructors ---------------------------------------------------------
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Constructs ...
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
public GroupNames()
|
|
||||||
{
|
|
||||||
this(Collections.emptyList());
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Constructs ...
|
|
||||||
*
|
|
||||||
*
|
|
||||||
* @param groupName
|
|
||||||
* @param groupNames
|
|
||||||
*/
|
|
||||||
public GroupNames(String groupName, String... groupNames)
|
|
||||||
{
|
|
||||||
this(Lists.asList(groupName, groupNames));
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Constructs ...
|
|
||||||
*
|
|
||||||
*
|
|
||||||
* @param collection
|
|
||||||
*/
|
|
||||||
public GroupNames(Collection<String> collection)
|
|
||||||
{
|
|
||||||
this.collection = Collections.unmodifiableCollection(collection);
|
|
||||||
}
|
|
||||||
|
|
||||||
//~--- methods --------------------------------------------------------------
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Method description
|
|
||||||
*
|
|
||||||
*
|
|
||||||
* @param groupName
|
|
||||||
*
|
|
||||||
* @return
|
|
||||||
*/
|
|
||||||
public boolean contains(String groupName)
|
|
||||||
{
|
|
||||||
return collection.contains(groupName);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* {@inheritDoc}
|
|
||||||
*/
|
|
||||||
@Override
|
|
||||||
public boolean equals(Object obj)
|
|
||||||
{
|
|
||||||
if (obj == null)
|
|
||||||
{
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
if (getClass() != obj.getClass())
|
|
||||||
{
|
|
||||||
return false;
|
|
||||||
}
|
|
||||||
|
|
||||||
final GroupNames other = (GroupNames) obj;
|
|
||||||
|
|
||||||
return Objects.equal(collection, other.collection);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* {@inheritDoc}
|
|
||||||
*/
|
|
||||||
@Override
|
|
||||||
public int hashCode()
|
|
||||||
{
|
|
||||||
return Objects.hashCode(collection);
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Method description
|
|
||||||
*
|
|
||||||
*
|
|
||||||
* @return
|
|
||||||
*/
|
|
||||||
@Override
|
|
||||||
public Iterator<String> iterator()
|
|
||||||
{
|
|
||||||
return collection.iterator();
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Method description
|
|
||||||
*
|
|
||||||
*
|
|
||||||
* @return
|
|
||||||
*/
|
|
||||||
@Override
|
|
||||||
public String toString()
|
|
||||||
{
|
|
||||||
return Joiner.on(", ").join(collection);
|
|
||||||
}
|
|
||||||
|
|
||||||
//~--- get methods ----------------------------------------------------------
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Method description
|
|
||||||
*
|
|
||||||
*
|
|
||||||
* @return
|
|
||||||
*/
|
|
||||||
public Collection<String> getCollection()
|
|
||||||
{
|
|
||||||
return collection;
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
//~--- fields ---------------------------------------------------------------
|
|
||||||
/** Field description */
|
|
||||||
private final Collection<String> collection;
|
|
||||||
}
|
|
||||||
@@ -99,15 +99,6 @@ public interface AccessTokenBuilder {
|
|||||||
*/
|
*/
|
||||||
AccessTokenBuilder scope(Scope scope);
|
AccessTokenBuilder scope(Scope scope);
|
||||||
|
|
||||||
/**
|
|
||||||
* Define the logged in user as member of the given groups.
|
|
||||||
*
|
|
||||||
* @param groups group names
|
|
||||||
*
|
|
||||||
* @return {@code this}
|
|
||||||
*/
|
|
||||||
AccessTokenBuilder groups(String... groups);
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Creates a new {@link AccessToken} with the provided settings.
|
* Creates a new {@link AccessToken} with the provided settings.
|
||||||
*
|
*
|
||||||
|
|||||||
@@ -31,7 +31,6 @@
|
|||||||
package sonia.scm.security;
|
package sonia.scm.security;
|
||||||
|
|
||||||
import sonia.scm.cache.CacheManager;
|
import sonia.scm.cache.CacheManager;
|
||||||
import sonia.scm.group.GroupDAO;
|
|
||||||
import sonia.scm.user.UserDAO;
|
import sonia.scm.user.UserDAO;
|
||||||
|
|
||||||
import javax.inject.Inject;
|
import javax.inject.Inject;
|
||||||
@@ -47,21 +46,17 @@ public final class DAORealmHelperFactory {
|
|||||||
private final LoginAttemptHandler loginAttemptHandler;
|
private final LoginAttemptHandler loginAttemptHandler;
|
||||||
private final UserDAO userDAO;
|
private final UserDAO userDAO;
|
||||||
private final CacheManager cacheManager;
|
private final CacheManager cacheManager;
|
||||||
private final GroupResolver groupResolver;
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Constructs a new instance.
|
* Constructs a new instance.
|
||||||
* @param loginAttemptHandler login attempt handler
|
* @param loginAttemptHandler login attempt handler
|
||||||
* @param userDAO user dao
|
* @param userDAO user dao
|
||||||
* @param groupDAO group dao
|
|
||||||
* @param cacheManager
|
* @param cacheManager
|
||||||
* @param groupResolver
|
|
||||||
*/
|
*/
|
||||||
@Inject
|
@Inject
|
||||||
public DAORealmHelperFactory(LoginAttemptHandler loginAttemptHandler, UserDAO userDAO, GroupDAO groupDAO, CacheManager cacheManager, GroupResolver groupResolver) {
|
public DAORealmHelperFactory(LoginAttemptHandler loginAttemptHandler, UserDAO userDAO, CacheManager cacheManager) {
|
||||||
this.loginAttemptHandler = loginAttemptHandler;
|
this.loginAttemptHandler = loginAttemptHandler;
|
||||||
this.userDAO = userDAO;
|
this.userDAO = userDAO;
|
||||||
this.groupResolver = groupResolver;
|
|
||||||
this.cacheManager = cacheManager;
|
this.cacheManager = cacheManager;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
@@ -32,25 +32,15 @@ import com.google.inject.Inject;
|
|||||||
import org.apache.shiro.authc.AuthenticationInfo;
|
import org.apache.shiro.authc.AuthenticationInfo;
|
||||||
import org.apache.shiro.authc.SimpleAuthenticationInfo;
|
import org.apache.shiro.authc.SimpleAuthenticationInfo;
|
||||||
import org.apache.shiro.subject.SimplePrincipalCollection;
|
import org.apache.shiro.subject.SimplePrincipalCollection;
|
||||||
import org.slf4j.Logger;
|
|
||||||
import org.slf4j.LoggerFactory;
|
|
||||||
import sonia.scm.AlreadyExistsException;
|
import sonia.scm.AlreadyExistsException;
|
||||||
import sonia.scm.NotFoundException;
|
import sonia.scm.NotFoundException;
|
||||||
import sonia.scm.cache.CacheManager;
|
|
||||||
import sonia.scm.group.ExternalGroupNames;
|
|
||||||
import sonia.scm.group.Group;
|
import sonia.scm.group.Group;
|
||||||
import sonia.scm.group.GroupDAO;
|
|
||||||
import sonia.scm.group.GroupManager;
|
import sonia.scm.group.GroupManager;
|
||||||
import sonia.scm.plugin.Extension;
|
import sonia.scm.plugin.Extension;
|
||||||
import sonia.scm.user.User;
|
import sonia.scm.user.User;
|
||||||
import sonia.scm.user.UserManager;
|
import sonia.scm.user.UserManager;
|
||||||
import sonia.scm.web.security.AdministrationContext;
|
import sonia.scm.web.security.AdministrationContext;
|
||||||
|
|
||||||
import java.util.Collection;
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static java.util.Arrays.asList;
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Helper class for syncing realms. The class should simplify the creation of realms, which are syncing authenticated
|
* Helper class for syncing realms. The class should simplify the creation of realms, which are syncing authenticated
|
||||||
* users with the local database.
|
* users with the local database.
|
||||||
@@ -61,12 +51,9 @@ import static java.util.Arrays.asList;
|
|||||||
@Extension
|
@Extension
|
||||||
public final class SyncingRealmHelper {
|
public final class SyncingRealmHelper {
|
||||||
|
|
||||||
private static final Logger LOG = LoggerFactory.getLogger(SyncingRealmHelper.class);
|
|
||||||
|
|
||||||
private final AdministrationContext ctx;
|
private final AdministrationContext ctx;
|
||||||
private final UserManager userManager;
|
private final UserManager userManager;
|
||||||
private final GroupManager groupManager;
|
private final GroupManager groupManager;
|
||||||
private final CacheManager cacheManager;
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Constructs a new SyncingRealmHelper.
|
* Constructs a new SyncingRealmHelper.
|
||||||
@@ -74,133 +61,28 @@ public final class SyncingRealmHelper {
|
|||||||
* @param ctx administration context
|
* @param ctx administration context
|
||||||
* @param userManager user manager
|
* @param userManager user manager
|
||||||
* @param groupManager group manager
|
* @param groupManager group manager
|
||||||
* @param groupDAO group dao
|
|
||||||
*/
|
*/
|
||||||
@Inject
|
@Inject
|
||||||
public SyncingRealmHelper(AdministrationContext ctx, UserManager userManager, GroupManager groupManager, GroupDAO groupDAO, CacheManager cacheManager) {
|
public SyncingRealmHelper(AdministrationContext ctx, UserManager userManager, GroupManager groupManager) {
|
||||||
this.ctx = ctx;
|
this.ctx = ctx;
|
||||||
this.userManager = userManager;
|
this.userManager = userManager;
|
||||||
this.groupManager = groupManager;
|
this.groupManager = groupManager;
|
||||||
this.cacheManager = cacheManager;
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
|
||||||
* Create {@link AuthenticationInfo} from user and groups.
|
|
||||||
*/
|
|
||||||
public AuthenticationInfoBuilder.ForRealm authenticationInfo() {
|
|
||||||
return new AuthenticationInfoBuilder().new ForRealm();
|
|
||||||
}
|
|
||||||
|
|
||||||
public class AuthenticationInfoBuilder {
|
|
||||||
private String realm;
|
|
||||||
private User user;
|
|
||||||
private Collection<String> groups = Collections.emptySet();
|
|
||||||
private Collection<String> externalGroups = Collections.emptySet();
|
|
||||||
|
|
||||||
private AuthenticationInfo build() {
|
|
||||||
return SyncingRealmHelper.this.createAuthenticationInfo(realm, user, groups, externalGroups);
|
|
||||||
}
|
|
||||||
|
|
||||||
public class ForRealm {
|
|
||||||
private ForRealm() {
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Sets the realm.
|
|
||||||
* @param realm name of the realm
|
|
||||||
*/
|
|
||||||
public ForUser forRealm(String realm) {
|
|
||||||
AuthenticationInfoBuilder.this.realm = realm;
|
|
||||||
return AuthenticationInfoBuilder.this.new ForUser();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
public class ForUser {
|
|
||||||
private ForUser() {
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Sets the user.
|
|
||||||
* @param user authenticated user
|
|
||||||
*/
|
|
||||||
public AuthenticationInfoBuilder.WithGroups andUser(User user) {
|
|
||||||
AuthenticationInfoBuilder.this.user = user;
|
|
||||||
return AuthenticationInfoBuilder.this.new WithGroups();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
public class WithGroups {
|
|
||||||
private WithGroups() {
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Set the internal groups for the user.
|
|
||||||
* @param groups groups of the authenticated user
|
|
||||||
* @return builder step for groups
|
|
||||||
*/
|
|
||||||
public WithGroups withGroups(String... groups) {
|
|
||||||
return withGroups(asList(groups));
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Set the internal groups for the user.
|
|
||||||
* @param groups groups of the authenticated user
|
|
||||||
* @return builder step for groups
|
|
||||||
*/
|
|
||||||
public WithGroups withGroups(Collection<String> groups) {
|
|
||||||
AuthenticationInfoBuilder.this.groups = groups;
|
|
||||||
return this;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Set the external groups for the user.
|
|
||||||
* @param externalGroups external groups of the authenticated user
|
|
||||||
* @return builder step for groups
|
|
||||||
*/
|
|
||||||
public WithGroups withExternalGroups(String... externalGroups) {
|
|
||||||
return withExternalGroups(asList(externalGroups));
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Set the external groups for the user.
|
|
||||||
* @param externalGroups external groups of the authenticated user
|
|
||||||
* @return builder step for groups
|
|
||||||
*/
|
|
||||||
public WithGroups withExternalGroups(Collection<String> externalGroups) {
|
|
||||||
AuthenticationInfoBuilder.this.externalGroups = externalGroups;
|
|
||||||
return this;
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
|
||||||
* Builds the {@link AuthenticationInfo} from the given options.
|
|
||||||
*
|
|
||||||
* @return complete autentication info
|
|
||||||
*/
|
|
||||||
public AuthenticationInfo build() {
|
|
||||||
return AuthenticationInfoBuilder.this.build();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
//~--- methods --------------------------------------------------------------
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Create {@link AuthenticationInfo} from user and groups.
|
* Create {@link AuthenticationInfo} from user and groups.
|
||||||
*
|
*
|
||||||
*
|
*
|
||||||
* @param realm name of the realm
|
* @param realm name of the realm
|
||||||
* @param user authenticated user
|
* @param user authenticated user
|
||||||
* @param groups groups of the authenticated user
|
|
||||||
*
|
*
|
||||||
* @return authentication info
|
* @return authentication info
|
||||||
*/
|
*/
|
||||||
private AuthenticationInfo createAuthenticationInfo(String realm, User user,
|
public AuthenticationInfo createAuthenticationInfo(String realm, User user) {
|
||||||
Collection<String> groups, Collection<String> externalGroups) {
|
|
||||||
SimplePrincipalCollection collection = new SimplePrincipalCollection();
|
SimplePrincipalCollection collection = new SimplePrincipalCollection();
|
||||||
|
|
||||||
collection.add(user.getId(), realm);
|
collection.add(user.getId(), realm);
|
||||||
collection.add(user, realm);
|
collection.add(user, realm);
|
||||||
collection.add(new ExternalGroupNames(externalGroups), realm);
|
|
||||||
|
|
||||||
return new SimpleAuthenticationInfo(collection, user.getPassword());
|
return new SimpleAuthenticationInfo(collection, user.getPassword());
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -37,17 +37,13 @@ package sonia.scm.security;
|
|||||||
|
|
||||||
import com.google.common.base.Throwables;
|
import com.google.common.base.Throwables;
|
||||||
import org.apache.shiro.authc.AuthenticationInfo;
|
import org.apache.shiro.authc.AuthenticationInfo;
|
||||||
import org.assertj.core.api.Assertions;
|
|
||||||
import org.junit.Before;
|
import org.junit.Before;
|
||||||
import org.junit.Test;
|
import org.junit.Test;
|
||||||
import org.junit.runner.RunWith;
|
import org.junit.runner.RunWith;
|
||||||
import org.mockito.Mock;
|
import org.mockito.Mock;
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
import org.mockito.junit.MockitoJUnitRunner;
|
||||||
import sonia.scm.AlreadyExistsException;
|
import sonia.scm.AlreadyExistsException;
|
||||||
import sonia.scm.cache.CacheManager;
|
|
||||||
import sonia.scm.group.ExternalGroupNames;
|
|
||||||
import sonia.scm.group.Group;
|
import sonia.scm.group.Group;
|
||||||
import sonia.scm.group.GroupDAO;
|
|
||||||
import sonia.scm.group.GroupManager;
|
import sonia.scm.group.GroupManager;
|
||||||
import sonia.scm.user.User;
|
import sonia.scm.user.User;
|
||||||
import sonia.scm.user.UserManager;
|
import sonia.scm.user.UserManager;
|
||||||
@@ -81,12 +77,6 @@ public class SyncingRealmHelperTest {
|
|||||||
@Mock
|
@Mock
|
||||||
private UserManager userManager;
|
private UserManager userManager;
|
||||||
|
|
||||||
@Mock
|
|
||||||
private GroupDAO groupDAO;
|
|
||||||
|
|
||||||
@Mock
|
|
||||||
CacheManager cacheManager;
|
|
||||||
|
|
||||||
private SyncingRealmHelper helper;
|
private SyncingRealmHelper helper;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -112,7 +102,7 @@ public class SyncingRealmHelperTest {
|
|||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
helper = new SyncingRealmHelper(ctx, userManager, groupManager, groupDAO, cacheManager);
|
helper = new SyncingRealmHelper(ctx, userManager, groupManager);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -189,27 +179,11 @@ public class SyncingRealmHelperTest {
|
|||||||
verify(userManager, times(1)).modify(user);
|
verify(userManager, times(1)).modify(user);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
|
||||||
public void builderShouldSetExternalGroups() {
|
|
||||||
AuthenticationInfo authenticationInfo = helper
|
|
||||||
.authenticationInfo()
|
|
||||||
.forRealm("unit-test")
|
|
||||||
.andUser(new User("ziltoid"))
|
|
||||||
.withExternalGroups("external")
|
|
||||||
.build();
|
|
||||||
|
|
||||||
ExternalGroupNames groupNames = authenticationInfo.getPrincipals().oneByType(ExternalGroupNames.class);
|
|
||||||
Assertions.assertThat(groupNames.getCollection()).containsOnly("external");
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
public void builderShouldSetValues() {
|
public void builderShouldSetValues() {
|
||||||
User user = new User("ziltoid");
|
User user = new User("ziltoid");
|
||||||
AuthenticationInfo authInfo = helper
|
AuthenticationInfo authInfo = helper.createAuthenticationInfo("unit-test", user);
|
||||||
.authenticationInfo()
|
|
||||||
.forRealm("unit-test")
|
|
||||||
.andUser(user)
|
|
||||||
.build();
|
|
||||||
|
|
||||||
assertNotNull(authInfo);
|
assertNotNull(authInfo);
|
||||||
assertEquals("ziltoid", authInfo.getPrincipals().getPrimaryPrincipal());
|
assertEquals("ziltoid", authInfo.getPrincipals().getPrimaryPrincipal());
|
||||||
|
|||||||
@@ -7,7 +7,7 @@ import lombok.Getter;
|
|||||||
import lombok.NoArgsConstructor;
|
import lombok.NoArgsConstructor;
|
||||||
import lombok.Setter;
|
import lombok.Setter;
|
||||||
|
|
||||||
import java.util.List;
|
import java.util.Set;
|
||||||
|
|
||||||
@Getter
|
@Getter
|
||||||
@Setter
|
@Setter
|
||||||
@@ -17,7 +17,7 @@ public class MeDto extends HalRepresentation {
|
|||||||
private String name;
|
private String name;
|
||||||
private String displayName;
|
private String displayName;
|
||||||
private String mail;
|
private String mail;
|
||||||
private List<String> groups;
|
private Set<String> groups;
|
||||||
|
|
||||||
MeDto(Links links, Embedded embedded) {
|
MeDto(Links links, Embedded embedded) {
|
||||||
super(links, embedded);
|
super(links, embedded);
|
||||||
|
|||||||
@@ -1,18 +1,16 @@
|
|||||||
package sonia.scm.api.v2.resources;
|
package sonia.scm.api.v2.resources;
|
||||||
|
|
||||||
import com.google.common.collect.ImmutableList;
|
|
||||||
import de.otto.edison.hal.Embedded;
|
import de.otto.edison.hal.Embedded;
|
||||||
import de.otto.edison.hal.Links;
|
import de.otto.edison.hal.Links;
|
||||||
import org.apache.shiro.SecurityUtils;
|
import org.apache.shiro.SecurityUtils;
|
||||||
import org.apache.shiro.subject.PrincipalCollection;
|
import org.apache.shiro.subject.PrincipalCollection;
|
||||||
import org.apache.shiro.subject.Subject;
|
import org.apache.shiro.subject.Subject;
|
||||||
import sonia.scm.group.GroupNames;
|
import sonia.scm.group.GroupCollector;
|
||||||
import sonia.scm.user.User;
|
import sonia.scm.user.User;
|
||||||
import sonia.scm.user.UserManager;
|
import sonia.scm.user.UserManager;
|
||||||
import sonia.scm.user.UserPermissions;
|
import sonia.scm.user.UserPermissions;
|
||||||
|
|
||||||
import javax.inject.Inject;
|
import javax.inject.Inject;
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static de.otto.edison.hal.Embedded.embeddedBuilder;
|
import static de.otto.edison.hal.Embedded.embeddedBuilder;
|
||||||
import static de.otto.edison.hal.Link.link;
|
import static de.otto.edison.hal.Link.link;
|
||||||
@@ -22,11 +20,13 @@ public class MeDtoFactory extends HalAppenderMapper {
|
|||||||
|
|
||||||
private final ResourceLinks resourceLinks;
|
private final ResourceLinks resourceLinks;
|
||||||
private final UserManager userManager;
|
private final UserManager userManager;
|
||||||
|
private final GroupCollector groupCollector;
|
||||||
|
|
||||||
@Inject
|
@Inject
|
||||||
public MeDtoFactory(ResourceLinks resourceLinks, UserManager userManager) {
|
public MeDtoFactory(ResourceLinks resourceLinks, UserManager userManager, GroupCollector groupCollector) {
|
||||||
this.resourceLinks = resourceLinks;
|
this.resourceLinks = resourceLinks;
|
||||||
this.userManager = userManager;
|
this.userManager = userManager;
|
||||||
|
this.groupCollector = groupCollector;
|
||||||
}
|
}
|
||||||
|
|
||||||
public MeDto create() {
|
public MeDto create() {
|
||||||
@@ -35,16 +35,12 @@ public class MeDtoFactory extends HalAppenderMapper {
|
|||||||
|
|
||||||
MeDto dto = createDto(user);
|
MeDto dto = createDto(user);
|
||||||
mapUserProperties(user, dto);
|
mapUserProperties(user, dto);
|
||||||
mapGroups(principals, dto);
|
mapGroups(user, dto);
|
||||||
return dto;
|
return dto;
|
||||||
}
|
}
|
||||||
|
|
||||||
private void mapGroups(PrincipalCollection principals, MeDto dto) {
|
private void mapGroups(User user, MeDto dto) {
|
||||||
Iterable<String> groups = principals.oneByType(GroupNames.class);
|
dto.setGroups(groupCollector.collect(user.getName()));
|
||||||
if (groups == null) {
|
|
||||||
groups = Collections.emptySet();
|
|
||||||
}
|
|
||||||
dto.setGroups(ImmutableList.copyOf(groups));
|
|
||||||
}
|
}
|
||||||
|
|
||||||
private void mapUserProperties(User user, MeDto dto) {
|
private void mapUserProperties(User user, MeDto dto) {
|
||||||
|
|||||||
@@ -52,17 +52,18 @@ import org.slf4j.Logger;
|
|||||||
import org.slf4j.LoggerFactory;
|
import org.slf4j.LoggerFactory;
|
||||||
import sonia.scm.cache.Cache;
|
import sonia.scm.cache.Cache;
|
||||||
import sonia.scm.cache.CacheManager;
|
import sonia.scm.cache.CacheManager;
|
||||||
import sonia.scm.group.GroupNames;
|
import sonia.scm.group.GroupCollector;
|
||||||
import sonia.scm.group.GroupPermissions;
|
import sonia.scm.group.GroupPermissions;
|
||||||
import sonia.scm.plugin.Extension;
|
import sonia.scm.plugin.Extension;
|
||||||
import sonia.scm.repository.RepositoryPermission;
|
|
||||||
import sonia.scm.repository.Repository;
|
import sonia.scm.repository.Repository;
|
||||||
import sonia.scm.repository.RepositoryDAO;
|
import sonia.scm.repository.RepositoryDAO;
|
||||||
|
import sonia.scm.repository.RepositoryPermission;
|
||||||
import sonia.scm.user.User;
|
import sonia.scm.user.User;
|
||||||
import sonia.scm.user.UserPermissions;
|
import sonia.scm.user.UserPermissions;
|
||||||
import sonia.scm.util.Util;
|
import sonia.scm.util.Util;
|
||||||
|
|
||||||
import java.util.Collection;
|
import java.util.Collection;
|
||||||
|
import java.util.Set;
|
||||||
|
|
||||||
//~--- JDK imports ------------------------------------------------------------
|
//~--- JDK imports ------------------------------------------------------------
|
||||||
|
|
||||||
@@ -92,15 +93,17 @@ public class DefaultAuthorizationCollector implements AuthorizationCollector
|
|||||||
* @param repositoryDAO
|
* @param repositoryDAO
|
||||||
* @param securitySystem
|
* @param securitySystem
|
||||||
* @param repositoryPermissionProvider
|
* @param repositoryPermissionProvider
|
||||||
|
* @param groupCollector
|
||||||
*/
|
*/
|
||||||
@Inject
|
@Inject
|
||||||
public DefaultAuthorizationCollector(CacheManager cacheManager,
|
public DefaultAuthorizationCollector(CacheManager cacheManager,
|
||||||
RepositoryDAO repositoryDAO, SecuritySystem securitySystem, RepositoryPermissionProvider repositoryPermissionProvider)
|
RepositoryDAO repositoryDAO, SecuritySystem securitySystem, RepositoryPermissionProvider repositoryPermissionProvider, GroupCollector groupCollector)
|
||||||
{
|
{
|
||||||
this.cache = cacheManager.getCache(CACHE_NAME);
|
this.cache = cacheManager.getCache(CACHE_NAME);
|
||||||
this.repositoryDAO = repositoryDAO;
|
this.repositoryDAO = repositoryDAO;
|
||||||
this.securitySystem = securitySystem;
|
this.securitySystem = securitySystem;
|
||||||
this.repositoryPermissionProvider = repositoryPermissionProvider;
|
this.repositoryPermissionProvider = repositoryPermissionProvider;
|
||||||
|
this.groupCollector = groupCollector;
|
||||||
}
|
}
|
||||||
|
|
||||||
//~--- methods --------------------------------------------------------------
|
//~--- methods --------------------------------------------------------------
|
||||||
@@ -145,16 +148,16 @@ public class DefaultAuthorizationCollector implements AuthorizationCollector
|
|||||||
|
|
||||||
Preconditions.checkNotNull(user, "no user found in principal collection");
|
Preconditions.checkNotNull(user, "no user found in principal collection");
|
||||||
|
|
||||||
GroupNames groupNames = principals.oneByType(GroupNames.class);
|
Set<String> groups = groupCollector.collect(user.getName());
|
||||||
|
|
||||||
CacheKey cacheKey = new CacheKey(user.getId(), groupNames);
|
CacheKey cacheKey = new CacheKey(user.getId(), groups);
|
||||||
|
|
||||||
AuthorizationInfo info = cache.get(cacheKey);
|
AuthorizationInfo info = cache.get(cacheKey);
|
||||||
|
|
||||||
if (info == null)
|
if (info == null)
|
||||||
{
|
{
|
||||||
logger.trace("collect AuthorizationInfo for user {}", user.getName());
|
logger.trace("collect AuthorizationInfo for user {}", user.getName());
|
||||||
info = createAuthorizationInfo(user, groupNames);
|
info = createAuthorizationInfo(user, groups);
|
||||||
cache.put(cacheKey, info);
|
cache.put(cacheKey, info);
|
||||||
}
|
}
|
||||||
else if (logger.isTraceEnabled())
|
else if (logger.isTraceEnabled())
|
||||||
@@ -166,7 +169,7 @@ public class DefaultAuthorizationCollector implements AuthorizationCollector
|
|||||||
}
|
}
|
||||||
|
|
||||||
private void collectGlobalPermissions(Builder<String> builder,
|
private void collectGlobalPermissions(Builder<String> builder,
|
||||||
final User user, final GroupNames groups)
|
final User user, final Set<String> groups)
|
||||||
{
|
{
|
||||||
Collection<AssignedPermission> globalPermissions =
|
Collection<AssignedPermission> globalPermissions =
|
||||||
securitySystem.getPermissions((AssignedPermission input) -> isUserPermitted(user, groups, input));
|
securitySystem.getPermissions((AssignedPermission input) -> isUserPermitted(user, groups, input));
|
||||||
@@ -181,7 +184,7 @@ public class DefaultAuthorizationCollector implements AuthorizationCollector
|
|||||||
}
|
}
|
||||||
|
|
||||||
private void collectRepositoryPermissions(Builder<String> builder, User user,
|
private void collectRepositoryPermissions(Builder<String> builder, User user,
|
||||||
GroupNames groups)
|
Set<String> groups)
|
||||||
{
|
{
|
||||||
for (Repository repository : repositoryDAO.getAll())
|
for (Repository repository : repositoryDAO.getAll())
|
||||||
{
|
{
|
||||||
@@ -190,7 +193,7 @@ public class DefaultAuthorizationCollector implements AuthorizationCollector
|
|||||||
}
|
}
|
||||||
|
|
||||||
private void collectRepositoryPermissions(Builder<String> builder,
|
private void collectRepositoryPermissions(Builder<String> builder,
|
||||||
Repository repository, User user, GroupNames groups)
|
Repository repository, User user, Set<String> groups)
|
||||||
{
|
{
|
||||||
Collection<RepositoryPermission> repositoryPermissions = repository.getPermissions();
|
Collection<RepositoryPermission> repositoryPermissions = repository.getPermissions();
|
||||||
|
|
||||||
@@ -245,7 +248,7 @@ public class DefaultAuthorizationCollector implements AuthorizationCollector
|
|||||||
.getVerbs();
|
.getVerbs();
|
||||||
}
|
}
|
||||||
|
|
||||||
private AuthorizationInfo createAuthorizationInfo(User user, GroupNames groups) {
|
private AuthorizationInfo createAuthorizationInfo(User user, Set<String> groups) {
|
||||||
Builder<String> builder = ImmutableSet.builder();
|
Builder<String> builder = ImmutableSet.builder();
|
||||||
|
|
||||||
collectGlobalPermissions(builder, user, groups);
|
collectGlobalPermissions(builder, user, groups);
|
||||||
@@ -279,7 +282,7 @@ public class DefaultAuthorizationCollector implements AuthorizationCollector
|
|||||||
|
|
||||||
//~--- get methods ----------------------------------------------------------
|
//~--- get methods ----------------------------------------------------------
|
||||||
|
|
||||||
private boolean isUserPermitted(User user, GroupNames groups,
|
private boolean isUserPermitted(User user, Set<String> groups,
|
||||||
PermissionObject perm)
|
PermissionObject perm)
|
||||||
{
|
{
|
||||||
//J-
|
//J-
|
||||||
@@ -314,7 +317,7 @@ public class DefaultAuthorizationCollector implements AuthorizationCollector
|
|||||||
*/
|
*/
|
||||||
private static class CacheKey
|
private static class CacheKey
|
||||||
{
|
{
|
||||||
private CacheKey(String username, GroupNames groupnames)
|
private CacheKey(String username, Set<String> groupnames)
|
||||||
{
|
{
|
||||||
this.username = username;
|
this.username = username;
|
||||||
this.groupnames = groupnames;
|
this.groupnames = groupnames;
|
||||||
@@ -356,7 +359,7 @@ public class DefaultAuthorizationCollector implements AuthorizationCollector
|
|||||||
//~--- fields -------------------------------------------------------------
|
//~--- fields -------------------------------------------------------------
|
||||||
|
|
||||||
/** group names */
|
/** group names */
|
||||||
private final GroupNames groupnames;
|
private final Set<String> groupnames;
|
||||||
|
|
||||||
/** username */
|
/** username */
|
||||||
private final String username;
|
private final String username;
|
||||||
@@ -374,4 +377,5 @@ public class DefaultAuthorizationCollector implements AuthorizationCollector
|
|||||||
private final SecuritySystem securitySystem;
|
private final SecuritySystem securitySystem;
|
||||||
|
|
||||||
private final RepositoryPermissionProvider repositoryPermissionProvider;
|
private final RepositoryPermissionProvider repositoryPermissionProvider;
|
||||||
|
private final GroupCollector groupCollector;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -34,7 +34,6 @@ package sonia.scm.security;
|
|||||||
//~--- non-JDK imports --------------------------------------------------------
|
//~--- non-JDK imports --------------------------------------------------------
|
||||||
|
|
||||||
import com.google.common.annotations.VisibleForTesting;
|
import com.google.common.annotations.VisibleForTesting;
|
||||||
|
|
||||||
import org.apache.shiro.authc.AuthenticationException;
|
import org.apache.shiro.authc.AuthenticationException;
|
||||||
import org.apache.shiro.authc.AuthenticationInfo;
|
import org.apache.shiro.authc.AuthenticationInfo;
|
||||||
import org.apache.shiro.authc.AuthenticationToken;
|
import org.apache.shiro.authc.AuthenticationToken;
|
||||||
@@ -45,21 +44,16 @@ import org.apache.shiro.authz.AuthorizationInfo;
|
|||||||
import org.apache.shiro.authz.SimpleAuthorizationInfo;
|
import org.apache.shiro.authz.SimpleAuthorizationInfo;
|
||||||
import org.apache.shiro.realm.AuthorizingRealm;
|
import org.apache.shiro.realm.AuthorizingRealm;
|
||||||
import org.apache.shiro.subject.PrincipalCollection;
|
import org.apache.shiro.subject.PrincipalCollection;
|
||||||
|
import org.slf4j.Logger;
|
||||||
import org.apache.shiro.subject.SimplePrincipalCollection;
|
import org.slf4j.LoggerFactory;
|
||||||
import sonia.scm.group.GroupNames;
|
|
||||||
import sonia.scm.plugin.Extension;
|
import sonia.scm.plugin.Extension;
|
||||||
|
|
||||||
//~--- JDK imports ------------------------------------------------------------
|
|
||||||
|
|
||||||
import javax.inject.Inject;
|
import javax.inject.Inject;
|
||||||
import javax.inject.Singleton;
|
import javax.inject.Singleton;
|
||||||
|
|
||||||
import org.slf4j.Logger;
|
|
||||||
import org.slf4j.LoggerFactory;
|
|
||||||
|
|
||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
|
|
||||||
|
//~--- JDK imports ------------------------------------------------------------
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Default authorizing realm.
|
* Default authorizing realm.
|
||||||
*
|
*
|
||||||
@@ -180,8 +174,6 @@ public class DefaultRealm extends AuthorizingRealm
|
|||||||
StringBuilder buffer = new StringBuilder("authorization summary: ");
|
StringBuilder buffer = new StringBuilder("authorization summary: ");
|
||||||
|
|
||||||
buffer.append(SEPARATOR).append("username : ").append(collection.getPrimaryPrincipal());
|
buffer.append(SEPARATOR).append("username : ").append(collection.getPrimaryPrincipal());
|
||||||
buffer.append(SEPARATOR).append("groups : ");
|
|
||||||
append(buffer, collection.oneByType(GroupNames.class));
|
|
||||||
buffer.append(SEPARATOR).append("roles : ");
|
buffer.append(SEPARATOR).append("roles : ");
|
||||||
append(buffer, original.getRoles());
|
append(buffer, original.getRoles());
|
||||||
buffer.append(SEPARATOR).append("scope : ");
|
buffer.append(SEPARATOR).append("scope : ");
|
||||||
|
|||||||
@@ -40,11 +40,9 @@ import org.apache.shiro.SecurityUtils;
|
|||||||
import org.apache.shiro.subject.Subject;
|
import org.apache.shiro.subject.Subject;
|
||||||
import org.slf4j.Logger;
|
import org.slf4j.Logger;
|
||||||
import org.slf4j.LoggerFactory;
|
import org.slf4j.LoggerFactory;
|
||||||
import sonia.scm.group.ExternalGroupNames;
|
|
||||||
|
|
||||||
import java.time.Clock;
|
import java.time.Clock;
|
||||||
import java.time.Instant;
|
import java.time.Instant;
|
||||||
import java.util.Collections;
|
|
||||||
import java.util.Date;
|
import java.util.Date;
|
||||||
import java.util.HashMap;
|
import java.util.HashMap;
|
||||||
import java.util.HashSet;
|
import java.util.HashSet;
|
||||||
@@ -139,12 +137,6 @@ public final class JwtAccessTokenBuilder implements AccessTokenBuilder {
|
|||||||
return this;
|
return this;
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
|
||||||
public JwtAccessTokenBuilder groups(String... groups) {
|
|
||||||
Collections.addAll(this.groups, groups);
|
|
||||||
return this;
|
|
||||||
}
|
|
||||||
|
|
||||||
JwtAccessTokenBuilder refreshExpiration(Instant refreshExpiration) {
|
JwtAccessTokenBuilder refreshExpiration(Instant refreshExpiration) {
|
||||||
this.refreshExpiration = refreshExpiration;
|
this.refreshExpiration = refreshExpiration;
|
||||||
this.refreshableFor = 0;
|
this.refreshableFor = 0;
|
||||||
@@ -206,16 +198,6 @@ public final class JwtAccessTokenBuilder implements AccessTokenBuilder {
|
|||||||
claims.setIssuer(issuer);
|
claims.setIssuer(issuer);
|
||||||
}
|
}
|
||||||
|
|
||||||
if (!groups.isEmpty()) {
|
|
||||||
claims.put(JwtAccessToken.GROUPS_CLAIM_KEY, groups);
|
|
||||||
} else {
|
|
||||||
Subject currentSubject = SecurityUtils.getSubject();
|
|
||||||
ExternalGroupNames externalGroupNames = currentSubject.getPrincipals().oneByType(ExternalGroupNames.class);
|
|
||||||
if (externalGroupNames != null) {
|
|
||||||
claims.put(JwtAccessToken.GROUPS_CLAIM_KEY, externalGroupNames.getCollection().toArray(new String[]{}));
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// sign token and create compact version
|
// sign token and create compact version
|
||||||
String compact = Jwts.builder()
|
String compact = Jwts.builder()
|
||||||
.setClaims(claims)
|
.setClaims(claims)
|
||||||
|
|||||||
@@ -38,7 +38,6 @@ package sonia.scm.web.security;
|
|||||||
import com.google.inject.Inject;
|
import com.google.inject.Inject;
|
||||||
import com.google.inject.Injector;
|
import com.google.inject.Injector;
|
||||||
import com.google.inject.Singleton;
|
import com.google.inject.Singleton;
|
||||||
|
|
||||||
import org.apache.shiro.SecurityUtils;
|
import org.apache.shiro.SecurityUtils;
|
||||||
import org.apache.shiro.subject.PrincipalCollection;
|
import org.apache.shiro.subject.PrincipalCollection;
|
||||||
import org.apache.shiro.subject.SimplePrincipalCollection;
|
import org.apache.shiro.subject.SimplePrincipalCollection;
|
||||||
@@ -46,21 +45,17 @@ import org.apache.shiro.subject.Subject;
|
|||||||
import org.apache.shiro.subject.support.SubjectThreadState;
|
import org.apache.shiro.subject.support.SubjectThreadState;
|
||||||
import org.apache.shiro.util.ThreadContext;
|
import org.apache.shiro.util.ThreadContext;
|
||||||
import org.apache.shiro.util.ThreadState;
|
import org.apache.shiro.util.ThreadState;
|
||||||
|
|
||||||
import org.slf4j.Logger;
|
import org.slf4j.Logger;
|
||||||
import org.slf4j.LoggerFactory;
|
import org.slf4j.LoggerFactory;
|
||||||
|
|
||||||
import sonia.scm.SCMContext;
|
import sonia.scm.SCMContext;
|
||||||
import sonia.scm.group.GroupNames;
|
|
||||||
import sonia.scm.security.Role;
|
import sonia.scm.security.Role;
|
||||||
import sonia.scm.user.User;
|
import sonia.scm.user.User;
|
||||||
import sonia.scm.util.AssertUtil;
|
import sonia.scm.util.AssertUtil;
|
||||||
|
|
||||||
//~--- JDK imports ------------------------------------------------------------
|
import javax.xml.bind.JAXB;
|
||||||
|
|
||||||
import java.net.URL;
|
import java.net.URL;
|
||||||
|
|
||||||
import javax.xml.bind.JAXB;
|
//~--- JDK imports ------------------------------------------------------------
|
||||||
|
|
||||||
/**
|
/**
|
||||||
*
|
*
|
||||||
@@ -161,7 +156,6 @@ public class DefaultAdministrationContext implements AdministrationContext
|
|||||||
|
|
||||||
collection.add(adminUser.getId(), REALM);
|
collection.add(adminUser.getId(), REALM);
|
||||||
collection.add(adminUser, REALM);
|
collection.add(adminUser, REALM);
|
||||||
collection.add(new GroupNames(), REALM);
|
|
||||||
collection.add(AdministrationContextMarker.MARKER, REALM);
|
collection.add(AdministrationContextMarker.MARKER, REALM);
|
||||||
|
|
||||||
return collection;
|
return collection;
|
||||||
|
|||||||
@@ -1,9 +1,9 @@
|
|||||||
package sonia.scm.api.v2.resources;
|
package sonia.scm.api.v2.resources;
|
||||||
|
|
||||||
|
import com.google.common.collect.ImmutableSet;
|
||||||
import org.apache.shiro.subject.PrincipalCollection;
|
import org.apache.shiro.subject.PrincipalCollection;
|
||||||
import org.apache.shiro.subject.Subject;
|
import org.apache.shiro.subject.Subject;
|
||||||
import org.apache.shiro.util.ThreadContext;
|
import org.apache.shiro.util.ThreadContext;
|
||||||
import org.assertj.core.util.Lists;
|
|
||||||
import org.junit.jupiter.api.AfterEach;
|
import org.junit.jupiter.api.AfterEach;
|
||||||
import org.junit.jupiter.api.BeforeEach;
|
import org.junit.jupiter.api.BeforeEach;
|
||||||
import org.junit.jupiter.api.Test;
|
import org.junit.jupiter.api.Test;
|
||||||
@@ -12,7 +12,7 @@ import org.mockito.Mock;
|
|||||||
import org.mockito.junit.jupiter.MockitoExtension;
|
import org.mockito.junit.jupiter.MockitoExtension;
|
||||||
import org.mockito.junit.jupiter.MockitoSettings;
|
import org.mockito.junit.jupiter.MockitoSettings;
|
||||||
import org.mockito.quality.Strictness;
|
import org.mockito.quality.Strictness;
|
||||||
import sonia.scm.group.GroupNames;
|
import sonia.scm.group.GroupCollector;
|
||||||
import sonia.scm.user.User;
|
import sonia.scm.user.User;
|
||||||
import sonia.scm.user.UserManager;
|
import sonia.scm.user.UserManager;
|
||||||
import sonia.scm.user.UserTestData;
|
import sonia.scm.user.UserTestData;
|
||||||
@@ -20,7 +20,6 @@ import sonia.scm.user.UserTestData;
|
|||||||
import java.net.URI;
|
import java.net.URI;
|
||||||
|
|
||||||
import static org.assertj.core.api.Assertions.assertThat;
|
import static org.assertj.core.api.Assertions.assertThat;
|
||||||
import static org.mockito.ArgumentMatchers.any;
|
|
||||||
import static org.mockito.Mockito.mock;
|
import static org.mockito.Mockito.mock;
|
||||||
import static org.mockito.Mockito.when;
|
import static org.mockito.Mockito.when;
|
||||||
|
|
||||||
@@ -33,6 +32,9 @@ class MeDtoFactoryTest {
|
|||||||
@Mock
|
@Mock
|
||||||
private UserManager userManager;
|
private UserManager userManager;
|
||||||
|
|
||||||
|
@Mock
|
||||||
|
private GroupCollector groupCollector;
|
||||||
|
|
||||||
@Mock
|
@Mock
|
||||||
private Subject subject;
|
private Subject subject;
|
||||||
|
|
||||||
@@ -42,7 +44,7 @@ class MeDtoFactoryTest {
|
|||||||
void setUpContext() {
|
void setUpContext() {
|
||||||
ThreadContext.bind(subject);
|
ThreadContext.bind(subject);
|
||||||
ResourceLinks resourceLinks = ResourceLinksMock.createMock(baseUri);
|
ResourceLinks resourceLinks = ResourceLinksMock.createMock(baseUri);
|
||||||
meDtoFactory = new MeDtoFactory(resourceLinks, userManager);
|
meDtoFactory = new MeDtoFactory(resourceLinks, userManager, groupCollector);
|
||||||
}
|
}
|
||||||
|
|
||||||
@AfterEach
|
@AfterEach
|
||||||
@@ -69,24 +71,16 @@ class MeDtoFactoryTest {
|
|||||||
|
|
||||||
@Test
|
@Test
|
||||||
void shouldCreateMeDtoWithGroups() {
|
void shouldCreateMeDtoWithGroups() {
|
||||||
prepareSubject(UserTestData.createTrillian(), "HeartOfGold", "Puzzle42");
|
when(groupCollector.collect("trillian")).thenReturn(ImmutableSet.of("HeartOfGold", "Puzzle42"));
|
||||||
|
prepareSubject(UserTestData.createTrillian());
|
||||||
MeDto dto = meDtoFactory.create();
|
MeDto dto = meDtoFactory.create();
|
||||||
assertThat(dto.getGroups()).containsOnly("HeartOfGold", "Puzzle42");
|
assertThat(dto.getGroups()).containsOnly("HeartOfGold", "Puzzle42");
|
||||||
}
|
}
|
||||||
|
|
||||||
private void prepareSubject(User user, String... groups) {
|
private void prepareSubject(User user) {
|
||||||
PrincipalCollection collection = mock(PrincipalCollection.class);
|
PrincipalCollection collection = mock(PrincipalCollection.class);
|
||||||
when(subject.getPrincipals()).thenReturn(collection);
|
when(subject.getPrincipals()).thenReturn(collection);
|
||||||
when(collection.oneByType(any(Class.class))).then(ic -> {
|
when(collection.oneByType(User.class)).thenReturn(user);
|
||||||
Class<?> type = ic.getArgument(0);
|
|
||||||
if (type.isAssignableFrom(User.class)) {
|
|
||||||
return user;
|
|
||||||
} else if (type.isAssignableFrom(GroupNames.class)) {
|
|
||||||
return new GroupNames(Lists.newArrayList(groups));
|
|
||||||
} else {
|
|
||||||
return null;
|
|
||||||
}
|
|
||||||
});
|
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
@Test
|
||||||
|
|||||||
@@ -33,6 +33,7 @@ package sonia.scm.security;
|
|||||||
|
|
||||||
import com.github.sdorra.shiro.ShiroRule;
|
import com.github.sdorra.shiro.ShiroRule;
|
||||||
import com.github.sdorra.shiro.SubjectAware;
|
import com.github.sdorra.shiro.SubjectAware;
|
||||||
|
import com.google.common.collect.ImmutableSet;
|
||||||
import com.google.common.collect.Lists;
|
import com.google.common.collect.Lists;
|
||||||
import org.apache.shiro.authz.AuthorizationInfo;
|
import org.apache.shiro.authz.AuthorizationInfo;
|
||||||
import org.apache.shiro.authz.SimpleAuthorizationInfo;
|
import org.apache.shiro.authz.SimpleAuthorizationInfo;
|
||||||
@@ -49,7 +50,7 @@ import org.mockito.Mockito;
|
|||||||
import org.mockito.junit.MockitoJUnitRunner;
|
import org.mockito.junit.MockitoJUnitRunner;
|
||||||
import sonia.scm.cache.Cache;
|
import sonia.scm.cache.Cache;
|
||||||
import sonia.scm.cache.CacheManager;
|
import sonia.scm.cache.CacheManager;
|
||||||
import sonia.scm.group.GroupNames;
|
import sonia.scm.group.GroupCollector;
|
||||||
import sonia.scm.repository.Repository;
|
import sonia.scm.repository.Repository;
|
||||||
import sonia.scm.repository.RepositoryDAO;
|
import sonia.scm.repository.RepositoryDAO;
|
||||||
import sonia.scm.repository.RepositoryPermission;
|
import sonia.scm.repository.RepositoryPermission;
|
||||||
@@ -58,8 +59,6 @@ import sonia.scm.repository.RepositoryTestData;
|
|||||||
import sonia.scm.user.User;
|
import sonia.scm.user.User;
|
||||||
import sonia.scm.user.UserTestData;
|
import sonia.scm.user.UserTestData;
|
||||||
|
|
||||||
import java.util.Collections;
|
|
||||||
|
|
||||||
import static java.util.Arrays.asList;
|
import static java.util.Arrays.asList;
|
||||||
import static java.util.Collections.singletonList;
|
import static java.util.Collections.singletonList;
|
||||||
import static org.hamcrest.Matchers.containsInAnyOrder;
|
import static org.hamcrest.Matchers.containsInAnyOrder;
|
||||||
@@ -96,6 +95,9 @@ public class DefaultAuthorizationCollectorTest {
|
|||||||
@Mock
|
@Mock
|
||||||
private RepositoryPermissionProvider repositoryPermissionProvider;
|
private RepositoryPermissionProvider repositoryPermissionProvider;
|
||||||
|
|
||||||
|
@Mock
|
||||||
|
private GroupCollector groupCollector;
|
||||||
|
|
||||||
private DefaultAuthorizationCollector collector;
|
private DefaultAuthorizationCollector collector;
|
||||||
|
|
||||||
@Rule
|
@Rule
|
||||||
@@ -107,7 +109,7 @@ public class DefaultAuthorizationCollectorTest {
|
|||||||
@Before
|
@Before
|
||||||
public void setUp(){
|
public void setUp(){
|
||||||
when(cacheManager.getCache(Mockito.any(String.class))).thenReturn(cache);
|
when(cacheManager.getCache(Mockito.any(String.class))).thenReturn(cache);
|
||||||
collector = new DefaultAuthorizationCollector(cacheManager, repositoryDAO, securitySystem, repositoryPermissionProvider);
|
collector = new DefaultAuthorizationCollector(cacheManager, repositoryDAO, securitySystem, repositoryPermissionProvider, groupCollector);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -290,9 +292,13 @@ public class DefaultAuthorizationCollectorTest {
|
|||||||
SimplePrincipalCollection spc = new SimplePrincipalCollection();
|
SimplePrincipalCollection spc = new SimplePrincipalCollection();
|
||||||
spc.add(user.getName(), "unit");
|
spc.add(user.getName(), "unit");
|
||||||
spc.add(user, "unit");
|
spc.add(user, "unit");
|
||||||
spc.add(new GroupNames(group, groups), "unit");
|
|
||||||
Subject subject = new Subject.Builder().authenticated(true).principals(spc).buildSubject();
|
Subject subject = new Subject.Builder().authenticated(true).principals(spc).buildSubject();
|
||||||
shiro.setSubject(subject);
|
shiro.setSubject(subject);
|
||||||
|
|
||||||
|
ImmutableSet.Builder<String> builder = ImmutableSet.builder();
|
||||||
|
builder.add(group);
|
||||||
|
builder.add(groups);
|
||||||
|
when(groupCollector.collect(user.getName())).thenReturn(builder.build());
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
|||||||
@@ -36,8 +36,6 @@ package sonia.scm.security;
|
|||||||
//~--- non-JDK imports --------------------------------------------------------
|
//~--- non-JDK imports --------------------------------------------------------
|
||||||
|
|
||||||
import com.google.common.collect.Collections2;
|
import com.google.common.collect.Collections2;
|
||||||
import com.google.common.collect.Lists;
|
|
||||||
|
|
||||||
import org.apache.shiro.authc.AuthenticationInfo;
|
import org.apache.shiro.authc.AuthenticationInfo;
|
||||||
import org.apache.shiro.authc.AuthenticationToken;
|
import org.apache.shiro.authc.AuthenticationToken;
|
||||||
import org.apache.shiro.authc.DisabledAccountException;
|
import org.apache.shiro.authc.DisabledAccountException;
|
||||||
@@ -45,43 +43,44 @@ import org.apache.shiro.authc.IncorrectCredentialsException;
|
|||||||
import org.apache.shiro.authc.UnknownAccountException;
|
import org.apache.shiro.authc.UnknownAccountException;
|
||||||
import org.apache.shiro.authc.UsernamePasswordToken;
|
import org.apache.shiro.authc.UsernamePasswordToken;
|
||||||
import org.apache.shiro.authc.credential.DefaultPasswordService;
|
import org.apache.shiro.authc.credential.DefaultPasswordService;
|
||||||
import org.apache.shiro.crypto.hash.DefaultHashService;
|
|
||||||
import org.apache.shiro.subject.PrincipalCollection;
|
|
||||||
import org.apache.shiro.subject.SimplePrincipalCollection;
|
|
||||||
|
|
||||||
import org.junit.Before;
|
|
||||||
import org.junit.Test;
|
|
||||||
import org.junit.runner.RunWith;
|
|
||||||
|
|
||||||
import org.mockito.Mock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
|
||||||
|
|
||||||
import sonia.scm.group.Group;
|
|
||||||
import sonia.scm.group.GroupDAO;
|
|
||||||
import sonia.scm.group.GroupNames;
|
|
||||||
import sonia.scm.user.User;
|
|
||||||
import sonia.scm.user.UserDAO;
|
|
||||||
import sonia.scm.user.UserTestData;
|
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.*;
|
|
||||||
|
|
||||||
import static org.junit.Assert.*;
|
|
||||||
|
|
||||||
import static org.mockito.Mockito.*;
|
|
||||||
|
|
||||||
//~--- JDK imports ------------------------------------------------------------
|
|
||||||
|
|
||||||
import java.util.Collections;
|
|
||||||
import java.util.HashSet;
|
|
||||||
import java.util.List;
|
|
||||||
import java.util.Set;
|
|
||||||
|
|
||||||
import org.apache.shiro.authz.AuthorizationInfo;
|
import org.apache.shiro.authz.AuthorizationInfo;
|
||||||
import org.apache.shiro.authz.Permission;
|
import org.apache.shiro.authz.Permission;
|
||||||
import org.apache.shiro.authz.SimpleAuthorizationInfo;
|
import org.apache.shiro.authz.SimpleAuthorizationInfo;
|
||||||
import org.apache.shiro.authz.permission.WildcardPermissionResolver;
|
import org.apache.shiro.authz.permission.WildcardPermissionResolver;
|
||||||
|
import org.apache.shiro.crypto.hash.DefaultHashService;
|
||||||
|
import org.apache.shiro.subject.PrincipalCollection;
|
||||||
|
import org.apache.shiro.subject.SimplePrincipalCollection;
|
||||||
import org.hamcrest.Matchers;
|
import org.hamcrest.Matchers;
|
||||||
|
import org.junit.Before;
|
||||||
|
import org.junit.Test;
|
||||||
|
import org.junit.runner.RunWith;
|
||||||
import org.mockito.InjectMocks;
|
import org.mockito.InjectMocks;
|
||||||
|
import org.mockito.Mock;
|
||||||
|
import org.mockito.junit.MockitoJUnitRunner;
|
||||||
|
import sonia.scm.group.GroupDAO;
|
||||||
|
import sonia.scm.user.User;
|
||||||
|
import sonia.scm.user.UserDAO;
|
||||||
|
import sonia.scm.user.UserTestData;
|
||||||
|
|
||||||
|
import java.util.HashSet;
|
||||||
|
import java.util.Set;
|
||||||
|
|
||||||
|
import static org.hamcrest.Matchers.allOf;
|
||||||
|
import static org.hamcrest.Matchers.contains;
|
||||||
|
import static org.hamcrest.Matchers.containsInAnyOrder;
|
||||||
|
import static org.hamcrest.Matchers.hasItem;
|
||||||
|
import static org.hamcrest.Matchers.hasSize;
|
||||||
|
import static org.hamcrest.Matchers.is;
|
||||||
|
import static org.hamcrest.Matchers.not;
|
||||||
|
import static org.hamcrest.Matchers.nullValue;
|
||||||
|
import static org.junit.Assert.assertEquals;
|
||||||
|
import static org.junit.Assert.assertNotNull;
|
||||||
|
import static org.junit.Assert.assertThat;
|
||||||
|
import static org.mockito.Mockito.times;
|
||||||
|
import static org.mockito.Mockito.verify;
|
||||||
|
import static org.mockito.Mockito.when;
|
||||||
|
|
||||||
|
//~--- JDK imports ------------------------------------------------------------
|
||||||
|
|
||||||
/**
|
/**
|
||||||
*
|
*
|
||||||
@@ -206,32 +205,6 @@ public class DefaultRealmTest
|
|||||||
);
|
);
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
|
||||||
* Method description
|
|
||||||
*
|
|
||||||
*/
|
|
||||||
@Test
|
|
||||||
public void testGroupCollection()
|
|
||||||
{
|
|
||||||
User user = UserTestData.createTrillian();
|
|
||||||
//J-
|
|
||||||
List<Group> groups = Lists.newArrayList(
|
|
||||||
new Group(DefaultRealm.REALM, "scm", user.getName()),
|
|
||||||
new Group(DefaultRealm.REALM, "developers", "perfect")
|
|
||||||
);
|
|
||||||
//J+
|
|
||||||
|
|
||||||
when(groupDAO.getAll()).thenReturn(groups);
|
|
||||||
|
|
||||||
UsernamePasswordToken token = daoUser(user, "secret");
|
|
||||||
AuthenticationInfo info = realm.getAuthenticationInfo(token);
|
|
||||||
GroupNames groupNames = info.getPrincipals().oneByType(GroupNames.class);
|
|
||||||
|
|
||||||
assertNotNull(groupNames);
|
|
||||||
assertThat(groupNames.getCollection(), hasSize(2));
|
|
||||||
assertThat(groupNames, hasItems("scm", GroupNames.AUTHENTICATED));
|
|
||||||
}
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Method description
|
* Method description
|
||||||
*
|
*
|
||||||
@@ -251,12 +224,6 @@ public class DefaultRealmTest
|
|||||||
assertThat(collection.getRealmNames(), hasSize(1));
|
assertThat(collection.getRealmNames(), hasSize(1));
|
||||||
assertThat(collection.getRealmNames(), hasItem(DefaultRealm.REALM));
|
assertThat(collection.getRealmNames(), hasItem(DefaultRealm.REALM));
|
||||||
assertEquals(user, collection.oneByType(User.class));
|
assertEquals(user, collection.oneByType(User.class));
|
||||||
|
|
||||||
GroupNames groups = collection.oneByType(GroupNames.class);
|
|
||||||
|
|
||||||
assertNotNull(groups);
|
|
||||||
assertThat(groups.getCollection(), hasSize(1));
|
|
||||||
assertThat(groups.getCollection(), hasItem(GroupNames.AUTHENTICATED));
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/**
|
/**
|
||||||
|
|||||||
@@ -36,27 +36,25 @@ import com.github.sdorra.shiro.SubjectAware;
|
|||||||
import com.google.common.collect.Sets;
|
import com.google.common.collect.Sets;
|
||||||
import io.jsonwebtoken.Claims;
|
import io.jsonwebtoken.Claims;
|
||||||
import io.jsonwebtoken.Jwts;
|
import io.jsonwebtoken.Jwts;
|
||||||
import org.apache.shiro.SecurityUtils;
|
|
||||||
import org.apache.shiro.subject.PrincipalCollection;
|
|
||||||
import org.apache.shiro.subject.Subject;
|
|
||||||
import org.apache.shiro.util.ThreadContext;
|
import org.apache.shiro.util.ThreadContext;
|
||||||
import org.junit.Before;
|
import org.junit.Before;
|
||||||
import org.junit.Rule;
|
import org.junit.Rule;
|
||||||
import org.junit.Test;
|
import org.junit.Test;
|
||||||
import org.junit.runner.RunWith;
|
import org.junit.runner.RunWith;
|
||||||
import org.mockito.Mock;
|
import org.mockito.Mock;
|
||||||
import org.mockito.invocation.InvocationOnMock;
|
|
||||||
import org.mockito.junit.MockitoJUnitRunner;
|
import org.mockito.junit.MockitoJUnitRunner;
|
||||||
import sonia.scm.group.ExternalGroupNames;
|
|
||||||
|
|
||||||
import java.util.Arrays;
|
|
||||||
import java.util.List;
|
|
||||||
import java.util.Set;
|
import java.util.Set;
|
||||||
import java.util.concurrent.TimeUnit;
|
import java.util.concurrent.TimeUnit;
|
||||||
|
|
||||||
import static org.hamcrest.Matchers.*;
|
import static org.hamcrest.Matchers.isEmptyOrNullString;
|
||||||
import static org.junit.Assert.*;
|
import static org.hamcrest.Matchers.not;
|
||||||
import static org.mockito.Mockito.*;
|
import static org.junit.Assert.assertEquals;
|
||||||
|
import static org.junit.Assert.assertNotNull;
|
||||||
|
import static org.junit.Assert.assertThat;
|
||||||
|
import static org.junit.Assert.assertTrue;
|
||||||
|
import static org.mockito.Mockito.anyString;
|
||||||
|
import static org.mockito.Mockito.when;
|
||||||
import static sonia.scm.security.SecureKeyTestUtil.createSecureKey;
|
import static sonia.scm.security.SecureKeyTestUtil.createSecureKey;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
@@ -137,7 +135,6 @@ public class JwtAccessTokenBuilderTest {
|
|||||||
.issuer("https://www.scm-manager.org")
|
.issuer("https://www.scm-manager.org")
|
||||||
.expiresIn(5, TimeUnit.SECONDS)
|
.expiresIn(5, TimeUnit.SECONDS)
|
||||||
.custom("a", "b")
|
.custom("a", "b")
|
||||||
.groups("one", "two", "three")
|
|
||||||
.scope(Scope.valueOf("repo:*"))
|
.scope(Scope.valueOf("repo:*"))
|
||||||
.build();
|
.build();
|
||||||
|
|
||||||
@@ -154,36 +151,6 @@ public class JwtAccessTokenBuilderTest {
|
|||||||
assertClaims(new JwtAccessToken(claims, compact));
|
assertClaims(new JwtAccessToken(claims, compact));
|
||||||
}
|
}
|
||||||
|
|
||||||
@Test
|
|
||||||
public void testWithExternalGroups() {
|
|
||||||
applyExternalGroupsToSubject(true, "external");
|
|
||||||
JwtAccessToken token = factory.create().subject("dent").build();
|
|
||||||
assertArrayEquals(new String[]{"external"}, token.getCustom(JwtAccessToken.GROUPS_CLAIM_KEY).map(x -> (String[]) x).get());
|
|
||||||
}
|
|
||||||
|
|
||||||
@Test
|
|
||||||
public void testWithInternalGroups() {
|
|
||||||
applyExternalGroupsToSubject(false, "external");
|
|
||||||
JwtAccessToken token = factory.create().subject("dent").build();
|
|
||||||
assertFalse(token.getCustom(JwtAccessToken.GROUPS_CLAIM_KEY).isPresent());
|
|
||||||
}
|
|
||||||
|
|
||||||
private void applyExternalGroupsToSubject(boolean external, String... groups) {
|
|
||||||
Subject subject = spy(SecurityUtils.getSubject());
|
|
||||||
when(subject.getPrincipals()).thenAnswer(invocation -> enrichWithGroups(invocation, groups, external));
|
|
||||||
shiro.setSubject(subject);
|
|
||||||
}
|
|
||||||
|
|
||||||
private Object enrichWithGroups(InvocationOnMock invocation, String[] groups, boolean external) throws Throwable {
|
|
||||||
PrincipalCollection principals = (PrincipalCollection) spy(invocation.callRealMethod());
|
|
||||||
|
|
||||||
List<String> groupCollection = Arrays.asList(groups);
|
|
||||||
if (external) {
|
|
||||||
when(principals.oneByType(ExternalGroupNames.class)).thenReturn(new ExternalGroupNames(groupCollection));
|
|
||||||
}
|
|
||||||
return principals;
|
|
||||||
}
|
|
||||||
|
|
||||||
private void assertClaims(JwtAccessToken token){
|
private void assertClaims(JwtAccessToken token){
|
||||||
assertThat(token.getId(), not(isEmptyOrNullString()));
|
assertThat(token.getId(), not(isEmptyOrNullString()));
|
||||||
assertNotNull( token.getIssuedAt() );
|
assertNotNull( token.getIssuedAt() );
|
||||||
@@ -194,6 +161,5 @@ public class JwtAccessTokenBuilderTest {
|
|||||||
assertEquals(token.getIssuer().get(), "https://www.scm-manager.org");
|
assertEquals(token.getIssuer().get(), "https://www.scm-manager.org");
|
||||||
assertEquals("b", token.getCustom("a").get());
|
assertEquals("b", token.getCustom("a").get());
|
||||||
assertEquals("[\"repo:*\"]", token.getScope().toString());
|
assertEquals("[\"repo:*\"]", token.getScope().toString());
|
||||||
assertThat(token.getGroups(), containsInAnyOrder("one", "two", "three"));
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|||||||
Reference in New Issue
Block a user