mirror of
https://repository.entgra.net/community/device-mgt-core.git
synced 2025-10-06 02:01:45 +00:00
Add permission updating logic
This commit is contained in:
parent
fe795bc399
commit
22b9897a4b
@ -38,6 +38,6 @@ public interface APIPublisherService {
|
|||||||
|
|
||||||
void addDefaultScopesIfNotExist();
|
void addDefaultScopesIfNotExist();
|
||||||
|
|
||||||
void updateScopeRoleMapping(String roleName, String[] permissions) throws APIManagerPublisherException;
|
void updateScopeRoleMapping(String roleName, String[] permissions, String[] removedPermissions) throws APIManagerPublisherException;
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|||||||
@ -626,7 +626,7 @@ public class APIPublisherServiceImpl implements APIPublisherService {
|
|||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
public void updateScopeRoleMapping(String roleName, String[] permissions) throws APIManagerPublisherException {
|
public void updateScopeRoleMapping(String roleName, String[] permissions, String[] removedPermissions) throws APIManagerPublisherException {
|
||||||
APIApplicationServices apiApplicationServices = new APIApplicationServicesImpl();
|
APIApplicationServices apiApplicationServices = new APIApplicationServicesImpl();
|
||||||
APIApplicationKey apiApplicationKey;
|
APIApplicationKey apiApplicationKey;
|
||||||
AccessTokenInfo accessTokenInfo;
|
AccessTokenInfo accessTokenInfo;
|
||||||
@ -643,49 +643,14 @@ public class APIPublisherServiceImpl implements APIPublisherService {
|
|||||||
try {
|
try {
|
||||||
PublisherRESTAPIServices publisherRESTAPIServices = new PublisherRESTAPIServicesImpl();
|
PublisherRESTAPIServices publisherRESTAPIServices = new PublisherRESTAPIServicesImpl();
|
||||||
JSONObject scopeObject = publisherRESTAPIServices.getScopes(apiApplicationKey, accessTokenInfo);
|
JSONObject scopeObject = publisherRESTAPIServices.getScopes(apiApplicationKey, accessTokenInfo);
|
||||||
|
|
||||||
Map<String, String> permScopeMap = APIPublisherDataHolder.getInstance().getPermScopeMapping();
|
Map<String, String> permScopeMap = APIPublisherDataHolder.getInstance().getPermScopeMapping();
|
||||||
for (String permission : permissions) {
|
if (permissions.length != 0) {
|
||||||
String scopeValue = permScopeMap.get(permission);
|
updateScopes(roleName, publisherRESTAPIServices, apiApplicationKey, accessTokenInfo, scopeObject, permissions, permScopeMap, false);
|
||||||
if (scopeValue == null) {
|
|
||||||
String msg = "Found invalid permission: " + permission + ". Hence aborting the scope role " +
|
|
||||||
"mapping process";
|
|
||||||
log.error(msg);
|
|
||||||
throw new APIManagerPublisherException(msg);
|
|
||||||
}
|
|
||||||
|
|
||||||
JSONArray scopeList = (JSONArray) scopeObject.get("list");
|
|
||||||
for (int i = 0; i < scopeList.length(); i++) {
|
|
||||||
JSONObject scopeObj = scopeList.getJSONObject(i);
|
|
||||||
if (scopeObj.getString("name").equals(scopeValue)) {
|
|
||||||
Scope scope = new Scope();
|
|
||||||
scope.setName(scopeObj.getString("name"));
|
|
||||||
scope.setKey(scopeObj.getString("name"));
|
|
||||||
scope.setDescription(scopeObj.getString("description"));
|
|
||||||
scope.setId(scopeObj.getString("id"));
|
|
||||||
|
|
||||||
// Including already existing roles
|
|
||||||
JSONArray existingRolesArray = (JSONArray) scopeObj.get("bindings");
|
|
||||||
List<String> existingRoleList = new ArrayList<String>();
|
|
||||||
|
|
||||||
for (int j = 0; j < existingRolesArray.length(); j++) {
|
|
||||||
existingRoleList.add((String) existingRolesArray.get(j));
|
|
||||||
}
|
|
||||||
if (!existingRoleList.contains(roleName)) {
|
|
||||||
existingRoleList.add(roleName);
|
|
||||||
}
|
|
||||||
scope.setRoles(String.join(",", existingRoleList));
|
|
||||||
|
|
||||||
if (publisherRESTAPIServices.isSharedScopeNameExists(apiApplicationKey, accessTokenInfo, scope.getKey())) {
|
|
||||||
publisherRESTAPIServices.updateSharedScope(apiApplicationKey, accessTokenInfo, scope);
|
|
||||||
} else {
|
|
||||||
// todo: come to this level means, that scope is removed from API, but haven't removed from the scope-role-permission-mappings list
|
|
||||||
log.warn(scope.getKey() + " not available as shared scope");
|
|
||||||
}
|
|
||||||
break;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
if (removedPermissions.length != 0) {
|
||||||
|
updateScopes(roleName, publisherRESTAPIServices, apiApplicationKey, accessTokenInfo, scopeObject, removedPermissions, permScopeMap, true);
|
||||||
|
}
|
||||||
|
|
||||||
try {
|
try {
|
||||||
updatePermissions(roleName, Arrays.asList(permissions));
|
updatePermissions(roleName, Arrays.asList(permissions));
|
||||||
} catch (UserStoreException e) {
|
} catch (UserStoreException e) {
|
||||||
@ -708,6 +673,62 @@ public class APIPublisherServiceImpl implements APIPublisherService {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
private void updateScopes (String roleName, PublisherRESTAPIServices publisherRESTAPIServices,
|
||||||
|
APIApplicationKey apiApplicationKey, AccessTokenInfo accessTokenInfo,
|
||||||
|
JSONObject scopeObject, String[] permissions, Map<String, String> permScopeMap, boolean removingPermissions )
|
||||||
|
throws APIManagerPublisherException {
|
||||||
|
for (String permission : permissions) {
|
||||||
|
String scopeValue = permScopeMap.get(permission);
|
||||||
|
if (scopeValue == null) {
|
||||||
|
String msg = "Found invalid permission: " + permission + ". Hence aborting the scope role " +
|
||||||
|
"mapping process";
|
||||||
|
log.error(msg);
|
||||||
|
throw new APIManagerPublisherException(msg);
|
||||||
|
}
|
||||||
|
|
||||||
|
JSONArray scopeList = (JSONArray) scopeObject.get("list");
|
||||||
|
for (int i = 0; i < scopeList.length(); i++) {
|
||||||
|
JSONObject scopeObj = scopeList.getJSONObject(i);
|
||||||
|
if (scopeObj.getString("name").equals(scopeValue)) {
|
||||||
|
Scope scope = new Scope();
|
||||||
|
scope.setName(scopeObj.getString("name"));
|
||||||
|
scope.setKey(scopeObj.getString("name"));
|
||||||
|
scope.setDescription(scopeObj.getString("description"));
|
||||||
|
scope.setId(scopeObj.getString("id"));
|
||||||
|
|
||||||
|
// Including already existing roles
|
||||||
|
JSONArray existingRolesArray = (JSONArray) scopeObj.get("bindings");
|
||||||
|
List<String> existingRoleList = new ArrayList<String>();
|
||||||
|
|
||||||
|
for (int j = 0; j < existingRolesArray.length(); j++) {
|
||||||
|
existingRoleList.add((String) existingRolesArray.get(j));
|
||||||
|
}
|
||||||
|
|
||||||
|
if (removingPermissions) {
|
||||||
|
existingRoleList.remove(roleName);
|
||||||
|
} else {
|
||||||
|
if (!existingRoleList.contains(roleName)) {
|
||||||
|
existingRoleList.add(roleName);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
scope.setRoles(String.join(",", existingRoleList));
|
||||||
|
|
||||||
|
try {
|
||||||
|
if (publisherRESTAPIServices.isSharedScopeNameExists(apiApplicationKey, accessTokenInfo, scope.getKey())) {
|
||||||
|
publisherRESTAPIServices.updateSharedScope(apiApplicationKey, accessTokenInfo, scope);
|
||||||
|
} else {
|
||||||
|
// todo: come to this level means, that scope is removed from API, but haven't removed from the scope-role-permission-mappings list
|
||||||
|
log.warn(scope.getKey() + " not available as shared scope");
|
||||||
|
}
|
||||||
|
} catch (APIServicesException | BadRequestException | UnexpectedResponseException e) {
|
||||||
|
log.error("Error occurred while updating role scope mapping via APIM REST endpoint.", e);
|
||||||
|
}
|
||||||
|
break;
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
private void updatePermissions(String role, List<String> permissions) throws UserStoreException {
|
private void updatePermissions(String role, List<String> permissions) throws UserStoreException {
|
||||||
AuthorizationManager authorizationManager = APIPublisherDataHolder.getInstance().getUserRealm()
|
AuthorizationManager authorizationManager = APIPublisherDataHolder.getInstance().getUserRealm()
|
||||||
.getAuthorizationManager();
|
.getAuthorizationManager();
|
||||||
|
|||||||
@ -33,6 +33,11 @@ public class RoleInfo {
|
|||||||
@ApiModelProperty(name = "permissions", value = "Lists out all the permissions associated with roles.",
|
@ApiModelProperty(name = "permissions", value = "Lists out all the permissions associated with roles.",
|
||||||
required = true, dataType = "List[java.lang.String]")
|
required = true, dataType = "List[java.lang.String]")
|
||||||
private String[] permissions;
|
private String[] permissions;
|
||||||
|
|
||||||
|
@ApiModelProperty(name = "removedPermissions", value = "Lists out all the permissions unassociated with roles.",
|
||||||
|
required = true, dataType = "List[java.lang.String]")
|
||||||
|
private String[] removedPermissions;
|
||||||
|
|
||||||
@ApiModelProperty(name = "users", value = "The list of users assigned to the selected role.",
|
@ApiModelProperty(name = "users", value = "The list of users assigned to the selected role.",
|
||||||
required = true, dataType = "List[java.lang.String]")
|
required = true, dataType = "List[java.lang.String]")
|
||||||
private String[] users;
|
private String[] users;
|
||||||
@ -76,4 +81,7 @@ public class RoleInfo {
|
|||||||
this.permissionList = permissionList;
|
this.permissionList = permissionList;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
public String[] getRemovedPermissions() { return removedPermissions; }
|
||||||
|
|
||||||
|
public void setRemovedPermissions(String[] removedPermissions) { this.removedPermissions = removedPermissions; }
|
||||||
}
|
}
|
||||||
|
|||||||
@ -403,8 +403,8 @@ public class RoleManagementServiceImpl implements RoleManagementService {
|
|||||||
try {
|
try {
|
||||||
if (roleInfo.getPermissions() != null && roleInfo.getPermissions().length > 0) {
|
if (roleInfo.getPermissions() != null && roleInfo.getPermissions().length > 0) {
|
||||||
String[] roleName = roleInfo.getRoleName().split("/");
|
String[] roleName = roleInfo.getRoleName().split("/");
|
||||||
addPermissions(roleName[roleName.length - 1], roleInfo.getPermissions(),
|
roleInfo.setRemovedPermissions(new String[0]);
|
||||||
DeviceMgtAPIUtils.getUserRealm());
|
updatePermissions(roleName[roleName.length - 1], roleInfo, DeviceMgtAPIUtils.getUserRealm());
|
||||||
}
|
}
|
||||||
} catch (UserStoreException e) {
|
} catch (UserStoreException e) {
|
||||||
String msg = "Error occurred while loading the user store.";
|
String msg = "Error occurred while loading the user store.";
|
||||||
@ -546,7 +546,7 @@ public class RoleManagementServiceImpl implements RoleManagementService {
|
|||||||
|
|
||||||
if (roleInfo.getPermissions() != null) {
|
if (roleInfo.getPermissions() != null) {
|
||||||
String[] roleDetails = roleName.split("/");
|
String[] roleDetails = roleName.split("/");
|
||||||
addPermissions(roleDetails[roleDetails.length - 1], roleInfo.getPermissions(), userRealm);
|
updatePermissions(roleDetails[roleDetails.length - 1], roleInfo, userRealm);
|
||||||
}
|
}
|
||||||
//TODO: Need to send the updated role information in the entity back to the client
|
//TODO: Need to send the updated role information in the entity back to the client
|
||||||
return Response.status(Response.Status.OK).entity("Role '" + roleInfo.getRoleName() + "' has " +
|
return Response.status(Response.Status.OK).entity("Role '" + roleInfo.getRoleName() + "' has " +
|
||||||
@ -697,7 +697,7 @@ public class RoleManagementServiceImpl implements RoleManagementService {
|
|||||||
return rolePermissions;
|
return rolePermissions;
|
||||||
}
|
}
|
||||||
|
|
||||||
private void addPermissions(String roleName, String[] permissions, UserRealm userRealm) {
|
private void updatePermissions(String roleName, RoleInfo roleInfo, UserRealm userRealm) {
|
||||||
String tenantDomain = PrivilegedCarbonContext.getThreadLocalCarbonContext().getTenantDomain(true);
|
String tenantDomain = PrivilegedCarbonContext.getThreadLocalCarbonContext().getTenantDomain(true);
|
||||||
Thread thread = new Thread(new Runnable() {
|
Thread thread = new Thread(new Runnable() {
|
||||||
@Override
|
@Override
|
||||||
@ -707,7 +707,8 @@ public class RoleManagementServiceImpl implements RoleManagementService {
|
|||||||
PrivilegedCarbonContext.getThreadLocalCarbonContext().setTenantDomain(tenantDomain, true);
|
PrivilegedCarbonContext.getThreadLocalCarbonContext().setTenantDomain(tenantDomain, true);
|
||||||
DeviceMgtAPIUtils.getApiPublisher().updateScopeRoleMapping(roleName,
|
DeviceMgtAPIUtils.getApiPublisher().updateScopeRoleMapping(roleName,
|
||||||
RoleManagementServiceImpl.this.getPlatformUIPermissions(roleName, userRealm,
|
RoleManagementServiceImpl.this.getPlatformUIPermissions(roleName, userRealm,
|
||||||
permissions));
|
roleInfo.getPermissions()), RoleManagementServiceImpl.this.getPlatformUIPermissions(roleName, userRealm,
|
||||||
|
roleInfo.getRemovedPermissions()));
|
||||||
} catch (APIManagerPublisherException | UserAdminException e) {
|
} catch (APIManagerPublisherException | UserAdminException e) {
|
||||||
log.error("Error Occurred while updating role scope mapping. ", e);
|
log.error("Error Occurred while updating role scope mapping. ", e);
|
||||||
} finally {
|
} finally {
|
||||||
|
|||||||
Loading…
Reference in New Issue
Block a user