blob: 033952fa3b54f49854439a732becd2ce71a6a178 [file] [log] [blame]
Brian O'Connor91d07982015-09-10 16:37:29 -07001/*
2 * Copyright 2015 Open Networking Laboratory
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
Changhoon Yoonb856b812015-08-10 03:47:19 +090016package org.onosproject.security.impl;
17
18
19import com.google.common.collect.ImmutableSet;
20import com.google.common.collect.Lists;
21import com.google.common.collect.Sets;
Heedo Kang4a47a302016-02-29 17:40:23 +090022import org.onosproject.cluster.ClusterAdminService;
23import org.onosproject.cluster.ClusterMetadataService;
24import org.onosproject.cluster.ClusterService;
25import org.onosproject.cluster.ClusterMetadataAdminService;
26import org.onosproject.cluster.LeadershipService;
27import org.onosproject.cluster.LeadershipAdminService;
28import org.onosproject.codec.CodecService;
29import org.onosproject.event.EventDeliveryService;
30import org.onosproject.mastership.MastershipTermService;
31import org.onosproject.net.config.BasicNetworkConfigService;
32import org.onosproject.net.config.NetworkConfigService;
33import org.onosproject.net.edge.EdgePortService;
34import org.onosproject.net.key.DeviceKeyAdminService;
35import org.onosproject.net.key.DeviceKeyService;
36import org.onosproject.net.newresource.ResourceAdminService;
37import org.onosproject.net.newresource.ResourceService;
38import org.onosproject.net.region.RegionAdminService;
39import org.onosproject.net.region.RegionService;
40import org.onosproject.net.statistic.FlowStatisticService;
41import org.onosproject.persistence.PersistenceService;
Changhoon Yoonb856b812015-08-10 03:47:19 +090042import org.onosproject.security.AppPermission;
43import org.onosproject.app.ApplicationAdminService;
44import org.onosproject.app.ApplicationService;
45import org.onosproject.cfg.ComponentConfigService;
Changhoon Yoonb856b812015-08-10 03:47:19 +090046import org.onosproject.core.CoreService;
Changhoon Yoonb856b812015-08-10 03:47:19 +090047import org.onosproject.mastership.MastershipAdminService;
48import org.onosproject.mastership.MastershipService;
49import org.onosproject.net.device.DeviceAdminService;
50import org.onosproject.net.device.DeviceService;
51import org.onosproject.net.device.DeviceClockService;
52import org.onosproject.net.driver.DriverAdminService;
53import org.onosproject.net.driver.DriverService;
54import org.onosproject.net.flow.FlowRuleService;
55import org.onosproject.net.flowobjective.FlowObjectiveService;
56import org.onosproject.net.group.GroupService;
57import org.onosproject.net.host.HostAdminService;
58import org.onosproject.net.host.HostService;
59import org.onosproject.net.intent.IntentService;
60import org.onosproject.net.intent.IntentExtensionService;
61import org.onosproject.net.intent.IntentClockService;
Madan Jampani1c965102016-01-13 14:34:16 -080062import org.onosproject.net.intent.IntentPartitionService;
Changhoon Yoonb856b812015-08-10 03:47:19 +090063import org.onosproject.net.link.LinkAdminService;
64import org.onosproject.net.link.LinkService;
65import org.onosproject.net.packet.PacketService;
66import org.onosproject.net.proxyarp.ProxyArpService;
Changhoon Yoonb856b812015-08-10 03:47:19 +090067import org.onosproject.net.statistic.StatisticService;
68import org.onosproject.net.topology.PathService;
69import org.onosproject.net.topology.TopologyService;
70import org.onosproject.security.SecurityAdminService;
Heedo Kang4a47a302016-02-29 17:40:23 +090071import org.onosproject.store.cluster.messaging.ClusterCommunicationService;
72import org.onosproject.store.cluster.messaging.MessagingService;
73import org.onosproject.store.primitives.PartitionAdminService;
74import org.onosproject.store.primitives.PartitionService;
75import org.onosproject.store.service.LogicalClockService;
76import org.onosproject.store.service.MutexExecutionService;
Changhoon Yoonb856b812015-08-10 03:47:19 +090077import org.onosproject.store.service.StorageAdminService;
78import org.onosproject.store.service.StorageService;
Heedo Kang4a47a302016-02-29 17:40:23 +090079import org.onosproject.ui.UiExtensionService;
Changhoon Yoonb856b812015-08-10 03:47:19 +090080import org.osgi.framework.ServicePermission;
Changhoon Yoone71dfa42015-12-04 21:49:25 +090081import org.osgi.framework.AdminPermission;
Changhoon Yoonb856b812015-08-10 03:47:19 +090082import org.osgi.framework.AdaptPermission;
Changhoon Yoone71dfa42015-12-04 21:49:25 +090083import org.osgi.framework.CapabilityPermission;
84import org.osgi.framework.BundlePermission;
85import org.osgi.framework.PackagePermission;
Changhoon Yoonb856b812015-08-10 03:47:19 +090086import org.osgi.service.cm.ConfigurationPermission;
87
88import javax.net.ssl.SSLPermission;
89import javax.security.auth.AuthPermission;
90import javax.security.auth.PrivateCredentialPermission;
91import javax.security.auth.kerberos.DelegationPermission;
92import javax.sound.sampled.AudioPermission;
93import java.io.FilePermission;
94import java.io.SerializablePermission;
Changhoon Yoone71dfa42015-12-04 21:49:25 +090095import java.lang.reflect.ReflectPermission;
Changhoon Yoonb856b812015-08-10 03:47:19 +090096import java.net.NetPermission;
97import java.net.SocketPermission;
98import java.security.Permissions;
99import java.sql.SQLPermission;
100import java.util.ArrayList;
101import java.util.Enumeration;
102import java.util.HashSet;
103import java.util.List;
104import java.util.PropertyPermission;
105import java.util.Set;
106import java.util.concurrent.ConcurrentHashMap;
107import java.security.Permission;
108import java.util.logging.LoggingPermission;
109
110import static org.onosproject.security.AppPermission.Type.*;
111
112public final class DefaultPolicyBuilder {
113
114 protected static ConcurrentHashMap<AppPermission.Type,
115 Set<String>> serviceDirectory = getServiceDirectory();
116
117 protected static List<Permission> defaultPermissions = getDefaultPerms();
118 protected static List<Permission> adminServicePermissions = getAdminDefaultPerms();
119
120 private DefaultPolicyBuilder(){
121 }
122
123 public static List<Permission> getUserApplicationPermissions(Set<org.onosproject.security.Permission> permissions) {
124 List<Permission> perms = Lists.newArrayList();
125 perms.addAll(defaultPermissions);
126 perms.addAll(convertToJavaPermissions(permissions));
127 return optimizePermissions(perms);
128 }
129
130 public static List<Permission> getAdminApplicationPermissions(
131 Set<org.onosproject.security.Permission> permissions) {
132 List<Permission> perms = Lists.newArrayList();
133 perms.addAll(defaultPermissions);
134 perms.addAll(adminServicePermissions);
135 for (AppPermission.Type perm : serviceDirectory.keySet()) {
136 perms.add(new AppPermission(perm));
137 }
138 perms.addAll(convertToJavaPermissions(permissions));
139 return optimizePermissions(perms);
140 }
141
142 public static List<Permission> convertToJavaPermissions(Set<org.onosproject.security.Permission> permissions) {
143 List<Permission> result = Lists.newArrayList();
144 for (org.onosproject.security.Permission perm : permissions) {
145 Permission javaPerm = getPermission(perm);
146 if (javaPerm != null) {
147 if (javaPerm instanceof AppPermission) {
148 if (((AppPermission) javaPerm).getType() != null) {
149 AppPermission ap = (AppPermission) javaPerm;
150 result.add(ap);
151 if (serviceDirectory.containsKey(ap.getType())) {
152 for (String service : serviceDirectory.get(ap.getType())) {
153 result.add(new ServicePermission(service, ServicePermission.GET));
154 }
155 }
156 }
157 } else if (javaPerm instanceof ServicePermission) {
158 if (!javaPerm.getName().contains(SecurityAdminService.class.getName())) {
159 result.add(javaPerm);
160 }
161 } else {
162 result.add(javaPerm);
163 }
164
165 }
166 }
167 return result;
168 }
169
170 public static Set<org.onosproject.security.Permission> convertToOnosPermissions(List<Permission> permissions) {
171 Set<org.onosproject.security.Permission> result = Sets.newHashSet();
172 for (Permission perm : permissions) {
173 org.onosproject.security.Permission onosPerm = getOnosPermission(perm);
174 if (onosPerm != null) {
175 result.add(onosPerm);
176 }
177 }
178 return result;
179 }
180
181 public static List<Permission> getDefaultPerms() {
182 List<Permission> permSet = Lists.newArrayList();
183 permSet.add(new PackagePermission("*", PackagePermission.EXPORTONLY));
184 permSet.add(new PackagePermission("*", PackagePermission.IMPORT));
185 permSet.add(new AdaptPermission("*", AdaptPermission.ADAPT));
186 permSet.add(new ConfigurationPermission("*", ConfigurationPermission.CONFIGURE));
Changhoon Yoone71dfa42015-12-04 21:49:25 +0900187 permSet.add(new AdminPermission("*", AdminPermission.METADATA));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900188 return permSet;
189 }
190
191 private static List<Permission> getAdminDefaultPerms() {
192 List<Permission> permSet = Lists.newArrayList();
193 permSet.add(new ServicePermission(ApplicationAdminService.class.getName(), ServicePermission.GET));
194 permSet.add(new ServicePermission(ClusterAdminService.class.getName(), ServicePermission.GET));
Heedo Kang4a47a302016-02-29 17:40:23 +0900195 permSet.add(new ServicePermission(LeadershipAdminService.class.getName(), ServicePermission.GET));
196 permSet.add(new ServicePermission(ClusterMetadataAdminService.class.getName(), ServicePermission.GET));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900197 permSet.add(new ServicePermission(MastershipAdminService.class.getName(), ServicePermission.GET));
198 permSet.add(new ServicePermission(DeviceAdminService.class.getName(), ServicePermission.GET));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900199 permSet.add(new ServicePermission(DriverAdminService.class.getName(), ServicePermission.GET));
Heedo Kang4a47a302016-02-29 17:40:23 +0900200 permSet.add(new ServicePermission(HostAdminService.class.getName(), ServicePermission.GET));
201 permSet.add(new ServicePermission(DeviceKeyAdminService.class.getName(), ServicePermission.GET));
202 permSet.add(new ServicePermission(LinkAdminService.class.getName(), ServicePermission.GET));
203 permSet.add(new ServicePermission(ResourceAdminService.class.getName(), ServicePermission.GET));
204 permSet.add(new ServicePermission(RegionAdminService.class.getName(), ServicePermission.GET));
205 permSet.add(new ServicePermission(PartitionAdminService.class.getName(), ServicePermission.GET));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900206 permSet.add(new ServicePermission(StorageAdminService.class.getName(), ServicePermission.GET));
Heedo Kang4a47a302016-02-29 17:40:23 +0900207
Changhoon Yoonb856b812015-08-10 03:47:19 +0900208 permSet.add(new ServicePermission(ApplicationService.class.getName(), ServicePermission.GET));
209 permSet.add(new ServicePermission(ComponentConfigService.class.getName(), ServicePermission.GET));
Heedo Kang4a47a302016-02-29 17:40:23 +0900210 permSet.add(new ServicePermission(ClusterMetadataService.class.getName(), ServicePermission.GET));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900211 permSet.add(new ServicePermission(ClusterService.class.getName(), ServicePermission.GET));
212 permSet.add(new ServicePermission(LeadershipService.class.getName(), ServicePermission.GET));
Heedo Kang4a47a302016-02-29 17:40:23 +0900213 permSet.add(new ServicePermission(CodecService.class.getName(), ServicePermission.GET));
214 permSet.add(new ServicePermission(CoreService.class.getName(), ServicePermission.GET));
215 permSet.add(new ServicePermission(EventDeliveryService.class.getName(), ServicePermission.GET));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900216 permSet.add(new ServicePermission(MastershipService.class.getName(), ServicePermission.GET));
Heedo Kang4a47a302016-02-29 17:40:23 +0900217 permSet.add(new ServicePermission(MastershipTermService.class.getName(), ServicePermission.GET));
218 permSet.add(new ServicePermission(BasicNetworkConfigService.class.getName(), ServicePermission.GET));
219 permSet.add(new ServicePermission(NetworkConfigService.class.getName(), ServicePermission.GET));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900220 permSet.add(new ServicePermission(DeviceService.class.getName(), ServicePermission.GET));
221 permSet.add(new ServicePermission(DeviceClockService.class.getName(), ServicePermission.GET));
222 permSet.add(new ServicePermission(DriverService.class.getName(), ServicePermission.GET));
Heedo Kang4a47a302016-02-29 17:40:23 +0900223 permSet.add(new ServicePermission(EdgePortService.class.getName(), ServicePermission.GET));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900224 permSet.add(new ServicePermission(FlowRuleService.class.getName(), ServicePermission.GET));
225 permSet.add(new ServicePermission(FlowObjectiveService.class.getName(), ServicePermission.GET));
226 permSet.add(new ServicePermission(GroupService.class.getName(), ServicePermission.GET));
227 permSet.add(new ServicePermission(HostService.class.getName(), ServicePermission.GET));
228 permSet.add(new ServicePermission(IntentService.class.getName(), ServicePermission.GET));
229 permSet.add(new ServicePermission(IntentClockService.class.getName(), ServicePermission.GET));
230 permSet.add(new ServicePermission(IntentExtensionService.class.getName(), ServicePermission.GET));
Madan Jampani1c965102016-01-13 14:34:16 -0800231 permSet.add(new ServicePermission(IntentPartitionService.class.getName(), ServicePermission.GET));
Heedo Kang4a47a302016-02-29 17:40:23 +0900232 permSet.add(new ServicePermission(DeviceKeyService.class.getName(), ServicePermission.GET));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900233 permSet.add(new ServicePermission(LinkService.class.getName(), ServicePermission.GET));
Heedo Kang4a47a302016-02-29 17:40:23 +0900234// permSet.add(new ServicePermission(MulticastRouteService.class.getName(), ServicePermission.GET));
235// permSet.add(new ServicePermission(MeterService.class.getName(), ServicePermission.GET));
236 permSet.add(new ServicePermission(ResourceService.class.getName(), ServicePermission.GET));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900237 permSet.add(new ServicePermission(PacketService.class.getName(), ServicePermission.GET));
238 permSet.add(new ServicePermission(ProxyArpService.class.getName(), ServicePermission.GET));
Heedo Kang4a47a302016-02-29 17:40:23 +0900239 permSet.add(new ServicePermission(RegionService.class.getName(), ServicePermission.GET));
240// permSet.add(new ServicePermission(LinkResourceService.class.getName(), ServicePermission.GET));
241 permSet.add(new ServicePermission(FlowStatisticService.class.getName(), ServicePermission.GET));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900242 permSet.add(new ServicePermission(StatisticService.class.getName(), ServicePermission.GET));
243 permSet.add(new ServicePermission(PathService.class.getName(), ServicePermission.GET));
244 permSet.add(new ServicePermission(TopologyService.class.getName(), ServicePermission.GET));
Heedo Kang4a47a302016-02-29 17:40:23 +0900245 permSet.add(new ServicePermission(PersistenceService.class.getName(), ServicePermission.GET));
246// permSet.add(new ServicePermission(ApiDocService.class.getName(), ServicePermission.GET));
247 permSet.add(new ServicePermission(ClusterCommunicationService.class.getName(), ServicePermission.GET));
248 permSet.add(new ServicePermission(MessagingService.class.getName(), ServicePermission.GET));
249 permSet.add(new ServicePermission(PartitionService.class.getName(), ServicePermission.GET));
250 permSet.add(new ServicePermission(LogicalClockService.class.getName(), ServicePermission.GET));
251 permSet.add(new ServicePermission(MutexExecutionService.class.getName(), ServicePermission.GET));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900252 permSet.add(new ServicePermission(StorageService.class.getName(), ServicePermission.GET));
Heedo Kang4a47a302016-02-29 17:40:23 +0900253 permSet.add(new ServicePermission(UiExtensionService.class.getName(), ServicePermission.GET));
254
Changhoon Yoonb856b812015-08-10 03:47:19 +0900255 return permSet;
256 }
257
258 public static Set<String> getNBServiceList() {
259 Set<String> permString = new HashSet<>();
260 for (Permission perm : getAdminDefaultPerms()) {
261 permString.add(perm.getName());
262 }
263 return permString;
264 }
265
266 private static ConcurrentHashMap<AppPermission.Type, Set<String>> getServiceDirectory() {
267
268 ConcurrentHashMap<AppPermission.Type, Set<String>> serviceDirectory = new ConcurrentHashMap<>();
269
270 serviceDirectory.put(APP_READ, ImmutableSet.of(
271 ApplicationService.class.getName(), CoreService.class.getName()));
272 serviceDirectory.put(APP_EVENT, ImmutableSet.of(
273 ApplicationService.class.getName(), CoreService.class.getName()));
Heedo Kang4a47a302016-02-29 17:40:23 +0900274 serviceDirectory.put(APP_WRITE, ImmutableSet.of(
275 CoreService.class.getName()));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900276 serviceDirectory.put(CONFIG_READ, ImmutableSet.of(
Heedo Kang4a47a302016-02-29 17:40:23 +0900277 ComponentConfigService.class.getName(), NetworkConfigService.class.getName()));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900278 serviceDirectory.put(CONFIG_WRITE, ImmutableSet.of(
Heedo Kang4a47a302016-02-29 17:40:23 +0900279 ComponentConfigService.class.getName(), NetworkConfigService.class.getName()));
280 serviceDirectory.put(CONFIG_EVENT, ImmutableSet.of(
281 NetworkConfigService.class.getName()));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900282 serviceDirectory.put(CLUSTER_READ, ImmutableSet.of(
283 ClusterService.class.getName(), LeadershipService.class.getName(),
Heedo Kang4a47a302016-02-29 17:40:23 +0900284 MastershipService.class.getName(), ClusterMetadataService.class.getName(),
285 MastershipTermService.class.getName()));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900286 serviceDirectory.put(CLUSTER_WRITE, ImmutableSet.of(
Heedo Kang4a47a302016-02-29 17:40:23 +0900287 LeadershipService.class.getName(), MastershipService.class.getName(),
288 ClusterCommunicationService.class.getName(), MessagingService.class.getName()));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900289 serviceDirectory.put(CLUSTER_EVENT, ImmutableSet.of(
290 ClusterService.class.getName(), LeadershipService.class.getName(),
291 MastershipService.class.getName()));
292 serviceDirectory.put(DEVICE_READ, ImmutableSet.of(
293 DeviceService.class.getName(), DeviceClockService.class.getName()));
294 serviceDirectory.put(DEVICE_EVENT, ImmutableSet.of(
295 DeviceService.class.getName()));
296 serviceDirectory.put(DRIVER_READ, ImmutableSet.of(
297 DriverService.class.getName()));
298 serviceDirectory.put(DRIVER_WRITE, ImmutableSet.of(
299 DriverService.class.getName()));
300 serviceDirectory.put(FLOWRULE_READ, ImmutableSet.of(
301 FlowRuleService.class.getName()));
302 serviceDirectory.put(FLOWRULE_WRITE, ImmutableSet.of(
303 FlowRuleService.class.getName(), FlowObjectiveService.class.getName()));
304 serviceDirectory.put(FLOWRULE_EVENT, ImmutableSet.of(
305 FlowRuleService.class.getName()));
306 serviceDirectory.put(GROUP_READ, ImmutableSet.of(
307 GroupService.class.getName()));
308 serviceDirectory.put(GROUP_WRITE, ImmutableSet.of(
309 GroupService.class.getName()));
310 serviceDirectory.put(GROUP_EVENT, ImmutableSet.of(
311 GroupService.class.getName()));
312 serviceDirectory.put(HOST_READ, ImmutableSet.of(
313 HostService.class.getName()));
314 serviceDirectory.put(HOST_WRITE, ImmutableSet.of(
315 HostService.class.getName()));
316 serviceDirectory.put(HOST_EVENT, ImmutableSet.of(
317 HostService.class.getName()));
318 serviceDirectory.put(INTENT_READ, ImmutableSet.of(
Madan Jampani1c965102016-01-13 14:34:16 -0800319 IntentService.class.getName(), IntentPartitionService.class.getName(),
Heedo Kang4a47a302016-02-29 17:40:23 +0900320 IntentClockService.class.getName(), IntentExtensionService.class.getName()));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900321 serviceDirectory.put(INTENT_WRITE, ImmutableSet.of(
Heedo Kang4a47a302016-02-29 17:40:23 +0900322 IntentService.class.getName(), IntentExtensionService.class.getName()));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900323 serviceDirectory.put(INTENT_EVENT, ImmutableSet.of(
Heedo Kang4a47a302016-02-29 17:40:23 +0900324 IntentService.class.getName(), IntentPartitionService.class.getName()));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900325// serviceDirectory.put(LINK_READ, ImmutableSet.of(
326// LinkService.class.getName(), LinkResourceService.class.getName(),
327// LabelResourceService.class.getName()));
328// serviceDirectory.put(LINK_WRITE, ImmutableSet.of(
329// LinkResourceService.class.getName(), LabelResourceService.class.getName()));
330// serviceDirectory.put(LINK_EVENT, ImmutableSet.of(
331// LinkService.class.getName(), LinkResourceService.class.getName(),
332// LabelResourceService.class.getName()));
333 serviceDirectory.put(PACKET_READ, ImmutableSet.of(
334 PacketService.class.getName(), ProxyArpService.class.getName()));
335 serviceDirectory.put(PACKET_WRITE, ImmutableSet.of(
Heedo Kang4a47a302016-02-29 17:40:23 +0900336 PacketService.class.getName(), ProxyArpService.class.getName(),
337 EdgePortService.class.getName()));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900338 serviceDirectory.put(PACKET_EVENT, ImmutableSet.of(
339 PacketService.class.getName()));
340 serviceDirectory.put(STATISTIC_READ, ImmutableSet.of(
Heedo Kang4a47a302016-02-29 17:40:23 +0900341 StatisticService.class.getName(), FlowStatisticService.class.getName()));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900342 serviceDirectory.put(TOPOLOGY_READ, ImmutableSet.of(
Heedo Kang4a47a302016-02-29 17:40:23 +0900343 TopologyService.class.getName(), PathService.class.getName(),
344 EdgePortService.class.getName()));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900345 serviceDirectory.put(TOPOLOGY_EVENT, ImmutableSet.of(
346 TopologyService.class.getName()));
347// serviceDirectory.put(TUNNEL_READ, ImmutableSet.of(
348// TunnelService.class.getName()));
349// serviceDirectory.put(TUNNEL_WRITE, ImmutableSet.of(
350// TunnelService.class.getName()));
351// serviceDirectory.put(TUNNEL_EVENT, ImmutableSet.of(
352// TunnelService.class.getName()));
353 serviceDirectory.put(STORAGE_WRITE, ImmutableSet.of(
354 StorageService.class.getName()));
Heedo Kang4a47a302016-02-29 17:40:23 +0900355 serviceDirectory.put(CODEC_READ, ImmutableSet.of(
356 CodecService.class.getName()));
357 serviceDirectory.put(CODEC_WRITE, ImmutableSet.of(
358 CodecService.class.getName()));
359 serviceDirectory.put(EVENT_READ, ImmutableSet.of(
360 EventDeliveryService.class.getName()));
361 serviceDirectory.put(EVENT_WRITE, ImmutableSet.of(
362 EventDeliveryService.class.getName()));
363 serviceDirectory.put(RESOURCE_READ, ImmutableSet.of(
364 ResourceService.class.getName()));
365 serviceDirectory.put(RESOURCE_WRITE, ImmutableSet.of(
366 ResourceService.class.getName()));
367 serviceDirectory.put(RESOURCE_EVENT, ImmutableSet.of(
368 ResourceService.class.getName()));
369 serviceDirectory.put(REGION_READ, ImmutableSet.of(
370 RegionService.class.getName()));
371 serviceDirectory.put(PERSISTENCE_WRITE, ImmutableSet.of(
372 PersistenceService.class.getName()));
373 serviceDirectory.put(PARTITION_READ, ImmutableSet.of(
374 PartitionService.class.getName()));
375 serviceDirectory.put(PARTITION_EVENT, ImmutableSet.of(
376 PartitionService.class.getName()));
377 serviceDirectory.put(CLOCK_WRITE, ImmutableSet.of(
378 LogicalClockService.class.getName()));
379 serviceDirectory.put(MUTEX_WRITE, ImmutableSet.of(
380 MutexExecutionService.class.getName()));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900381
382 return serviceDirectory;
383 }
384
385
386 public static org.onosproject.security.Permission getOnosPermission(Permission permission) {
387 if (permission instanceof AppPermission) {
388 return new org.onosproject.security.Permission(AppPermission.class.getName(), permission.getName(), "");
389 } else if (permission instanceof FilePermission) {
390 return new org.onosproject.security.Permission(
391 FilePermission.class.getName(), permission.getName(), permission.getActions());
392 } else if (permission instanceof SerializablePermission) {
393 return new org.onosproject.security.Permission(
394 SerializablePermission.class.getName(), permission.getName(), permission.getActions());
395 } else if (permission instanceof NetPermission) {
396 return new org.onosproject.security.Permission(
397 NetPermission.class.getName(), permission.getName(), permission.getActions());
398 } else if (permission instanceof RuntimePermission) {
399 return new org.onosproject.security.Permission(
400 RuntimePermission.class.getName(), permission.getName(), permission.getActions());
401 } else if (permission instanceof SocketPermission) {
402 return new org.onosproject.security.Permission(
403 SocketPermission.class.getName(), permission.getName(), permission.getActions());
404 } else if (permission instanceof SQLPermission) {
405 return new org.onosproject.security.Permission(
406 SQLPermission.class.getName(), permission.getName(), permission.getActions());
407 } else if (permission instanceof PropertyPermission) {
408 return new org.onosproject.security.Permission(
409 PropertyPermission.class.getName(), permission.getName(), permission.getActions());
410 } else if (permission instanceof LoggingPermission) {
411 return new org.onosproject.security.Permission(
412 LoggingPermission.class.getName(), permission.getName(), permission.getActions());
413 } else if (permission instanceof SSLPermission) {
414 return new org.onosproject.security.Permission(
415 SSLPermission.class.getName(), permission.getName(), permission.getActions());
416 } else if (permission instanceof AuthPermission) {
417 return new org.onosproject.security.Permission(
418 AuthPermission.class.getName(), permission.getName(), permission.getActions());
419 } else if (permission instanceof PrivateCredentialPermission) {
420 return new org.onosproject.security.Permission(
421 PrivateCredentialPermission.class.getName(), permission.getName(), permission.getActions());
422 } else if (permission instanceof DelegationPermission) {
423 return new org.onosproject.security.Permission(
424 DelegationPermission.class.getName(), permission.getName(), permission.getActions());
425 } else if (permission instanceof javax.security.auth.kerberos.ServicePermission) {
426 return new org.onosproject.security.Permission(
427 javax.security.auth.kerberos.ServicePermission.class.getName(), permission.getName(),
428 permission.getActions());
429 } else if (permission instanceof AudioPermission) {
430 return new org.onosproject.security.Permission(
431 AudioPermission.class.getName(), permission.getName(), permission.getActions());
432 } else if (permission instanceof AdaptPermission) {
433 return new org.onosproject.security.Permission(
434 AdaptPermission.class.getName(), permission.getName(), permission.getActions());
435 } else if (permission instanceof BundlePermission) {
436 return new org.onosproject.security.Permission(
437 BundlePermission.class.getName(), permission.getName(), permission.getActions());
438 } else if (permission instanceof CapabilityPermission) {
439 return new org.onosproject.security.Permission(
440 CapabilityPermission.class.getName(), permission.getName(), permission.getActions());
441 } else if (permission instanceof PackagePermission) {
442 return new org.onosproject.security.Permission(
443 PackagePermission.class.getName(), permission.getName(), permission.getActions());
444 } else if (permission instanceof ServicePermission) {
445 return new org.onosproject.security.Permission(
446 ServicePermission.class.getName(), permission.getName(), permission.getActions());
Changhoon Yoone71dfa42015-12-04 21:49:25 +0900447 } else if (permission instanceof AdminPermission) {
448 return new org.onosproject.security.Permission(
449 AdminPermission.class.getName(), permission.getName(), permission.getActions());
450 } else if (permission instanceof ConfigurationPermission) {
451 return new org.onosproject.security.Permission(
452 ConfigurationPermission.class.getName(), permission.getName(), permission.getActions());
Changhoon Yoonb856b812015-08-10 03:47:19 +0900453 }
454 return null;
455 }
456
457 private static Permission getPermission(org.onosproject.security.Permission permission) {
458
459 String classname = permission.getClassName();
460 String name = permission.getName();
461 String actions = permission.getActions();
462
463 if (classname == null || name == null) {
464 return null;
465 }
466 classname = classname.trim();
467 name = name.trim();
468 actions = actions.trim();
469
470 if (AppPermission.class.getName().equals(classname)) {
471 return new AppPermission(name);
472 } else if (FilePermission.class.getName().equals(classname)) {
473 return new FilePermission(name, actions);
474 } else if (SerializablePermission.class.getName().equals(classname)) {
475 return new SerializablePermission(name, actions);
476 } else if (NetPermission.class.getName().equals(classname)) {
477 return new NetPermission(name, actions);
478 } else if (RuntimePermission.class.getName().equals(classname)) {
479 return new RuntimePermission(name, actions);
480 } else if (SocketPermission.class.getName().equals(classname)) {
481 return new SocketPermission(name, actions);
482 } else if (SQLPermission.class.getName().equals(classname)) {
483 return new SQLPermission(name, actions);
484 } else if (PropertyPermission.class.getName().equals(classname)) {
485 return new PropertyPermission(name, actions);
486 } else if (LoggingPermission.class.getName().equals(classname)) {
487 return new LoggingPermission(name, actions);
488 } else if (SSLPermission.class.getName().equals(classname)) {
489 return new SSLPermission(name, actions);
490 } else if (AuthPermission.class.getName().equals(classname)) {
491 return new AuthPermission(name, actions);
492 } else if (PrivateCredentialPermission.class.getName().equals(classname)) {
493 return new PrivateCredentialPermission(name, actions);
494 } else if (DelegationPermission.class.getName().equals(classname)) {
495 return new DelegationPermission(name, actions);
496 } else if (javax.security.auth.kerberos.ServicePermission.class.getName().equals(classname)) {
497 return new javax.security.auth.kerberos.ServicePermission(name, actions);
498 } else if (AudioPermission.class.getName().equals(classname)) {
499 return new AudioPermission(name, actions);
500 } else if (AdaptPermission.class.getName().equals(classname)) {
501 return new AdaptPermission(name, actions);
502 } else if (BundlePermission.class.getName().equals(classname)) {
503 return new BundlePermission(name, actions);
504 } else if (CapabilityPermission.class.getName().equals(classname)) {
505 return new CapabilityPermission(name, actions);
506 } else if (PackagePermission.class.getName().equals(classname)) {
507 return new PackagePermission(name, actions);
508 } else if (ServicePermission.class.getName().equals(classname)) {
509 return new ServicePermission(name, actions);
Changhoon Yoone71dfa42015-12-04 21:49:25 +0900510 } else if (AdminPermission.class.getName().equals(classname)) {
511 return new AdminPermission(name, actions);
512 } else if (ConfigurationPermission.class.getName().equals(classname)) {
513 return new ConfigurationPermission(name, actions);
514 } else if (ReflectPermission.class.getName().equals(classname)) {
515 return new ReflectPermission(name, actions);
Changhoon Yoonb856b812015-08-10 03:47:19 +0900516 }
517
518 //AllPermission, SecurityPermission, UnresolvedPermission
Changhoon Yoone71dfa42015-12-04 21:49:25 +0900519 //AWTPermission, ReflectPermission not allowed
Changhoon Yoonb856b812015-08-10 03:47:19 +0900520 return null;
521
522 }
523 private static List<Permission> optimizePermissions(List<Permission> perms) {
524 Permissions permissions = listToPermissions(perms);
525 return permissionsToList(permissions);
526 }
527
528 private static List<Permission> permissionsToList(Permissions perms) {
529 List<Permission> permissions = new ArrayList<>();
530 Enumeration<Permission> e = perms.elements();
531 while (e.hasMoreElements()) {
532 permissions.add(e.nextElement());
533 }
534 return permissions;
535 }
536
537 private static Permissions listToPermissions(List<Permission> perms) {
538 Permissions permissions = new Permissions();
539 for (Permission perm : perms) {
540 permissions.add(perm);
541 }
542 return permissions;
543 }
Changhoon Yoone71dfa42015-12-04 21:49:25 +0900544}