blob: 8ae1a1aeb95ed86d96577a3122496d472fcb5c88 [file] [log] [blame]
Changhoon Yoonb856b812015-08-10 03:47:19 +09001package org.onosproject.security.impl;
2
3
4import com.google.common.collect.ImmutableSet;
5import com.google.common.collect.Lists;
6import com.google.common.collect.Sets;
7import org.onosproject.security.AppPermission;
8import org.onosproject.app.ApplicationAdminService;
9import org.onosproject.app.ApplicationService;
10import org.onosproject.cfg.ComponentConfigService;
11import org.onosproject.cluster.ClusterAdminService;
12import org.onosproject.cluster.ClusterService;
13import org.onosproject.core.CoreService;
14import org.onosproject.cluster.LeadershipService;
15import org.onosproject.mastership.MastershipAdminService;
16import org.onosproject.mastership.MastershipService;
17import org.onosproject.net.device.DeviceAdminService;
18import org.onosproject.net.device.DeviceService;
19import org.onosproject.net.device.DeviceClockService;
20import org.onosproject.net.driver.DriverAdminService;
21import org.onosproject.net.driver.DriverService;
22import org.onosproject.net.flow.FlowRuleService;
23import org.onosproject.net.flowobjective.FlowObjectiveService;
24import org.onosproject.net.group.GroupService;
25import org.onosproject.net.host.HostAdminService;
26import org.onosproject.net.host.HostService;
27import org.onosproject.net.intent.IntentService;
28import org.onosproject.net.intent.IntentExtensionService;
29import org.onosproject.net.intent.IntentClockService;
30import org.onosproject.net.intent.PartitionService;
31import org.onosproject.net.link.LinkAdminService;
32import org.onosproject.net.link.LinkService;
33import org.onosproject.net.packet.PacketService;
34import org.onosproject.net.proxyarp.ProxyArpService;
35import org.onosproject.net.resource.link.LinkResourceService;
36import org.onosproject.net.statistic.StatisticService;
37import org.onosproject.net.topology.PathService;
38import org.onosproject.net.topology.TopologyService;
39import org.onosproject.security.SecurityAdminService;
40import org.onosproject.store.service.StorageAdminService;
41import org.onosproject.store.service.StorageService;
42import org.osgi.framework.BundlePermission;
43import org.osgi.framework.CapabilityPermission;
44import org.osgi.framework.ServicePermission;
45import org.osgi.framework.PackagePermission;
46import org.osgi.framework.AdaptPermission;
47import org.osgi.service.cm.ConfigurationPermission;
48
49import javax.net.ssl.SSLPermission;
50import javax.security.auth.AuthPermission;
51import javax.security.auth.PrivateCredentialPermission;
52import javax.security.auth.kerberos.DelegationPermission;
53import javax.sound.sampled.AudioPermission;
54import java.io.FilePermission;
55import java.io.SerializablePermission;
56import java.net.NetPermission;
57import java.net.SocketPermission;
58import java.security.Permissions;
59import java.sql.SQLPermission;
60import java.util.ArrayList;
61import java.util.Enumeration;
62import java.util.HashSet;
63import java.util.List;
64import java.util.PropertyPermission;
65import java.util.Set;
66import java.util.concurrent.ConcurrentHashMap;
67import java.security.Permission;
68import java.util.logging.LoggingPermission;
69
70import static org.onosproject.security.AppPermission.Type.*;
71
72public final class DefaultPolicyBuilder {
73
74 protected static ConcurrentHashMap<AppPermission.Type,
75 Set<String>> serviceDirectory = getServiceDirectory();
76
77 protected static List<Permission> defaultPermissions = getDefaultPerms();
78 protected static List<Permission> adminServicePermissions = getAdminDefaultPerms();
79
80 private DefaultPolicyBuilder(){
81 }
82
83 public static List<Permission> getUserApplicationPermissions(Set<org.onosproject.security.Permission> permissions) {
84 List<Permission> perms = Lists.newArrayList();
85 perms.addAll(defaultPermissions);
86 perms.addAll(convertToJavaPermissions(permissions));
87 return optimizePermissions(perms);
88 }
89
90 public static List<Permission> getAdminApplicationPermissions(
91 Set<org.onosproject.security.Permission> permissions) {
92 List<Permission> perms = Lists.newArrayList();
93 perms.addAll(defaultPermissions);
94 perms.addAll(adminServicePermissions);
95 for (AppPermission.Type perm : serviceDirectory.keySet()) {
96 perms.add(new AppPermission(perm));
97 }
98 perms.addAll(convertToJavaPermissions(permissions));
99 return optimizePermissions(perms);
100 }
101
102 public static List<Permission> convertToJavaPermissions(Set<org.onosproject.security.Permission> permissions) {
103 List<Permission> result = Lists.newArrayList();
104 for (org.onosproject.security.Permission perm : permissions) {
105 Permission javaPerm = getPermission(perm);
106 if (javaPerm != null) {
107 if (javaPerm instanceof AppPermission) {
108 if (((AppPermission) javaPerm).getType() != null) {
109 AppPermission ap = (AppPermission) javaPerm;
110 result.add(ap);
111 if (serviceDirectory.containsKey(ap.getType())) {
112 for (String service : serviceDirectory.get(ap.getType())) {
113 result.add(new ServicePermission(service, ServicePermission.GET));
114 }
115 }
116 }
117 } else if (javaPerm instanceof ServicePermission) {
118 if (!javaPerm.getName().contains(SecurityAdminService.class.getName())) {
119 result.add(javaPerm);
120 }
121 } else {
122 result.add(javaPerm);
123 }
124
125 }
126 }
127 return result;
128 }
129
130 public static Set<org.onosproject.security.Permission> convertToOnosPermissions(List<Permission> permissions) {
131 Set<org.onosproject.security.Permission> result = Sets.newHashSet();
132 for (Permission perm : permissions) {
133 org.onosproject.security.Permission onosPerm = getOnosPermission(perm);
134 if (onosPerm != null) {
135 result.add(onosPerm);
136 }
137 }
138 return result;
139 }
140
141 public static List<Permission> getDefaultPerms() {
142 List<Permission> permSet = Lists.newArrayList();
143 permSet.add(new PackagePermission("*", PackagePermission.EXPORTONLY));
144 permSet.add(new PackagePermission("*", PackagePermission.IMPORT));
145 permSet.add(new AdaptPermission("*", AdaptPermission.ADAPT));
146 permSet.add(new ConfigurationPermission("*", ConfigurationPermission.CONFIGURE));
147 return permSet;
148 }
149
150 private static List<Permission> getAdminDefaultPerms() {
151 List<Permission> permSet = Lists.newArrayList();
152 permSet.add(new ServicePermission(ApplicationAdminService.class.getName(), ServicePermission.GET));
153 permSet.add(new ServicePermission(ClusterAdminService.class.getName(), ServicePermission.GET));
154 permSet.add(new ServicePermission(MastershipAdminService.class.getName(), ServicePermission.GET));
155 permSet.add(new ServicePermission(DeviceAdminService.class.getName(), ServicePermission.GET));
156 permSet.add(new ServicePermission(HostAdminService.class.getName(), ServicePermission.GET));
157 permSet.add(new ServicePermission(LinkAdminService.class.getName(), ServicePermission.GET));
158 permSet.add(new ServicePermission(DriverAdminService.class.getName(), ServicePermission.GET));
159 permSet.add(new ServicePermission(StorageAdminService.class.getName(), ServicePermission.GET));
160// permSet.add(new ServicePermission(LabelResourceAdminService.class.getName(), ServicePermission.GET));
161// permSet.add(new ServicePermission(TunnelAdminService.class.getName(), ServicePermission.GET));
162 permSet.add(new ServicePermission(ApplicationService.class.getName(), ServicePermission.GET));
163 permSet.add(new ServicePermission(ComponentConfigService.class.getName(), ServicePermission.GET));
164 permSet.add(new ServicePermission(CoreService.class.getName(), ServicePermission.GET));
165 permSet.add(new ServicePermission(ClusterService.class.getName(), ServicePermission.GET));
166 permSet.add(new ServicePermission(LeadershipService.class.getName(), ServicePermission.GET));
167 permSet.add(new ServicePermission(MastershipService.class.getName(), ServicePermission.GET));
168 permSet.add(new ServicePermission(DeviceService.class.getName(), ServicePermission.GET));
169 permSet.add(new ServicePermission(DeviceClockService.class.getName(), ServicePermission.GET));
170 permSet.add(new ServicePermission(DriverService.class.getName(), ServicePermission.GET));
171 permSet.add(new ServicePermission(FlowRuleService.class.getName(), ServicePermission.GET));
172 permSet.add(new ServicePermission(FlowObjectiveService.class.getName(), ServicePermission.GET));
173 permSet.add(new ServicePermission(GroupService.class.getName(), ServicePermission.GET));
174 permSet.add(new ServicePermission(HostService.class.getName(), ServicePermission.GET));
175 permSet.add(new ServicePermission(IntentService.class.getName(), ServicePermission.GET));
176 permSet.add(new ServicePermission(IntentClockService.class.getName(), ServicePermission.GET));
177 permSet.add(new ServicePermission(IntentExtensionService.class.getName(), ServicePermission.GET));
178 permSet.add(new ServicePermission(PartitionService.class.getName(), ServicePermission.GET));
179 permSet.add(new ServicePermission(LinkService.class.getName(), ServicePermission.GET));
180 permSet.add(new ServicePermission(LinkResourceService.class.getName(), ServicePermission.GET));
181// permSet.add(new ServicePermission(LabelResourceService.class.getName(), ServicePermission.GET));
182 permSet.add(new ServicePermission(PacketService.class.getName(), ServicePermission.GET));
183 permSet.add(new ServicePermission(ProxyArpService.class.getName(), ServicePermission.GET));
184 permSet.add(new ServicePermission(StatisticService.class.getName(), ServicePermission.GET));
185 permSet.add(new ServicePermission(PathService.class.getName(), ServicePermission.GET));
186 permSet.add(new ServicePermission(TopologyService.class.getName(), ServicePermission.GET));
187// permSet.add(new ServicePermission(TunnelService.class.getName(), ServicePermission.GET));
188 permSet.add(new ServicePermission(StorageService.class.getName(), ServicePermission.GET));
189 return permSet;
190 }
191
192 public static Set<String> getNBServiceList() {
193 Set<String> permString = new HashSet<>();
194 for (Permission perm : getAdminDefaultPerms()) {
195 permString.add(perm.getName());
196 }
197 return permString;
198 }
199
200 private static ConcurrentHashMap<AppPermission.Type, Set<String>> getServiceDirectory() {
201
202 ConcurrentHashMap<AppPermission.Type, Set<String>> serviceDirectory = new ConcurrentHashMap<>();
203
204 serviceDirectory.put(APP_READ, ImmutableSet.of(
205 ApplicationService.class.getName(), CoreService.class.getName()));
206 serviceDirectory.put(APP_EVENT, ImmutableSet.of(
207 ApplicationService.class.getName(), CoreService.class.getName()));
208 serviceDirectory.put(CONFIG_READ, ImmutableSet.of(
209 ComponentConfigService.class.getName()));
210 serviceDirectory.put(CONFIG_WRITE, ImmutableSet.of(
211 ComponentConfigService.class.getName()));
212 serviceDirectory.put(CLUSTER_READ, ImmutableSet.of(
213 ClusterService.class.getName(), LeadershipService.class.getName(),
214 MastershipService.class.getName()));
215 serviceDirectory.put(CLUSTER_WRITE, ImmutableSet.of(
216 LeadershipService.class.getName(), MastershipService.class.getName()));
217 serviceDirectory.put(CLUSTER_EVENT, ImmutableSet.of(
218 ClusterService.class.getName(), LeadershipService.class.getName(),
219 MastershipService.class.getName()));
220 serviceDirectory.put(DEVICE_READ, ImmutableSet.of(
221 DeviceService.class.getName(), DeviceClockService.class.getName()));
222 serviceDirectory.put(DEVICE_EVENT, ImmutableSet.of(
223 DeviceService.class.getName()));
224 serviceDirectory.put(DRIVER_READ, ImmutableSet.of(
225 DriverService.class.getName()));
226 serviceDirectory.put(DRIVER_WRITE, ImmutableSet.of(
227 DriverService.class.getName()));
228 serviceDirectory.put(FLOWRULE_READ, ImmutableSet.of(
229 FlowRuleService.class.getName()));
230 serviceDirectory.put(FLOWRULE_WRITE, ImmutableSet.of(
231 FlowRuleService.class.getName(), FlowObjectiveService.class.getName()));
232 serviceDirectory.put(FLOWRULE_EVENT, ImmutableSet.of(
233 FlowRuleService.class.getName()));
234 serviceDirectory.put(GROUP_READ, ImmutableSet.of(
235 GroupService.class.getName()));
236 serviceDirectory.put(GROUP_WRITE, ImmutableSet.of(
237 GroupService.class.getName()));
238 serviceDirectory.put(GROUP_EVENT, ImmutableSet.of(
239 GroupService.class.getName()));
240 serviceDirectory.put(HOST_READ, ImmutableSet.of(
241 HostService.class.getName()));
242 serviceDirectory.put(HOST_WRITE, ImmutableSet.of(
243 HostService.class.getName()));
244 serviceDirectory.put(HOST_EVENT, ImmutableSet.of(
245 HostService.class.getName()));
246 serviceDirectory.put(INTENT_READ, ImmutableSet.of(
247 IntentService.class.getName(), PartitionService.class.getName(),
248 IntentClockService.class.getName()));
249 serviceDirectory.put(INTENT_WRITE, ImmutableSet.of(
250 IntentService.class.getName()));
251 serviceDirectory.put(INTENT_EVENT, ImmutableSet.of(
252 IntentService.class.getName()));
253// serviceDirectory.put(LINK_READ, ImmutableSet.of(
254// LinkService.class.getName(), LinkResourceService.class.getName(),
255// LabelResourceService.class.getName()));
256// serviceDirectory.put(LINK_WRITE, ImmutableSet.of(
257// LinkResourceService.class.getName(), LabelResourceService.class.getName()));
258// serviceDirectory.put(LINK_EVENT, ImmutableSet.of(
259// LinkService.class.getName(), LinkResourceService.class.getName(),
260// LabelResourceService.class.getName()));
261 serviceDirectory.put(PACKET_READ, ImmutableSet.of(
262 PacketService.class.getName(), ProxyArpService.class.getName()));
263 serviceDirectory.put(PACKET_WRITE, ImmutableSet.of(
264 PacketService.class.getName(), ProxyArpService.class.getName()));
265 serviceDirectory.put(PACKET_EVENT, ImmutableSet.of(
266 PacketService.class.getName()));
267 serviceDirectory.put(STATISTIC_READ, ImmutableSet.of(
268 StatisticService.class.getName()));
269 serviceDirectory.put(TOPOLOGY_READ, ImmutableSet.of(
270 TopologyService.class.getName(), PathService.class.getName()));
271 serviceDirectory.put(TOPOLOGY_EVENT, ImmutableSet.of(
272 TopologyService.class.getName()));
273// serviceDirectory.put(TUNNEL_READ, ImmutableSet.of(
274// TunnelService.class.getName()));
275// serviceDirectory.put(TUNNEL_WRITE, ImmutableSet.of(
276// TunnelService.class.getName()));
277// serviceDirectory.put(TUNNEL_EVENT, ImmutableSet.of(
278// TunnelService.class.getName()));
279 serviceDirectory.put(STORAGE_WRITE, ImmutableSet.of(
280 StorageService.class.getName()));
281
282 return serviceDirectory;
283 }
284
285
286 public static org.onosproject.security.Permission getOnosPermission(Permission permission) {
287 if (permission instanceof AppPermission) {
288 return new org.onosproject.security.Permission(AppPermission.class.getName(), permission.getName(), "");
289 } else if (permission instanceof FilePermission) {
290 return new org.onosproject.security.Permission(
291 FilePermission.class.getName(), permission.getName(), permission.getActions());
292 } else if (permission instanceof SerializablePermission) {
293 return new org.onosproject.security.Permission(
294 SerializablePermission.class.getName(), permission.getName(), permission.getActions());
295 } else if (permission instanceof NetPermission) {
296 return new org.onosproject.security.Permission(
297 NetPermission.class.getName(), permission.getName(), permission.getActions());
298 } else if (permission instanceof RuntimePermission) {
299 return new org.onosproject.security.Permission(
300 RuntimePermission.class.getName(), permission.getName(), permission.getActions());
301 } else if (permission instanceof SocketPermission) {
302 return new org.onosproject.security.Permission(
303 SocketPermission.class.getName(), permission.getName(), permission.getActions());
304 } else if (permission instanceof SQLPermission) {
305 return new org.onosproject.security.Permission(
306 SQLPermission.class.getName(), permission.getName(), permission.getActions());
307 } else if (permission instanceof PropertyPermission) {
308 return new org.onosproject.security.Permission(
309 PropertyPermission.class.getName(), permission.getName(), permission.getActions());
310 } else if (permission instanceof LoggingPermission) {
311 return new org.onosproject.security.Permission(
312 LoggingPermission.class.getName(), permission.getName(), permission.getActions());
313 } else if (permission instanceof SSLPermission) {
314 return new org.onosproject.security.Permission(
315 SSLPermission.class.getName(), permission.getName(), permission.getActions());
316 } else if (permission instanceof AuthPermission) {
317 return new org.onosproject.security.Permission(
318 AuthPermission.class.getName(), permission.getName(), permission.getActions());
319 } else if (permission instanceof PrivateCredentialPermission) {
320 return new org.onosproject.security.Permission(
321 PrivateCredentialPermission.class.getName(), permission.getName(), permission.getActions());
322 } else if (permission instanceof DelegationPermission) {
323 return new org.onosproject.security.Permission(
324 DelegationPermission.class.getName(), permission.getName(), permission.getActions());
325 } else if (permission instanceof javax.security.auth.kerberos.ServicePermission) {
326 return new org.onosproject.security.Permission(
327 javax.security.auth.kerberos.ServicePermission.class.getName(), permission.getName(),
328 permission.getActions());
329 } else if (permission instanceof AudioPermission) {
330 return new org.onosproject.security.Permission(
331 AudioPermission.class.getName(), permission.getName(), permission.getActions());
332 } else if (permission instanceof AdaptPermission) {
333 return new org.onosproject.security.Permission(
334 AdaptPermission.class.getName(), permission.getName(), permission.getActions());
335 } else if (permission instanceof BundlePermission) {
336 return new org.onosproject.security.Permission(
337 BundlePermission.class.getName(), permission.getName(), permission.getActions());
338 } else if (permission instanceof CapabilityPermission) {
339 return new org.onosproject.security.Permission(
340 CapabilityPermission.class.getName(), permission.getName(), permission.getActions());
341 } else if (permission instanceof PackagePermission) {
342 return new org.onosproject.security.Permission(
343 PackagePermission.class.getName(), permission.getName(), permission.getActions());
344 } else if (permission instanceof ServicePermission) {
345 return new org.onosproject.security.Permission(
346 ServicePermission.class.getName(), permission.getName(), permission.getActions());
347 }
348 return null;
349 }
350
351 private static Permission getPermission(org.onosproject.security.Permission permission) {
352
353 String classname = permission.getClassName();
354 String name = permission.getName();
355 String actions = permission.getActions();
356
357 if (classname == null || name == null) {
358 return null;
359 }
360 classname = classname.trim();
361 name = name.trim();
362 actions = actions.trim();
363
364 if (AppPermission.class.getName().equals(classname)) {
365 return new AppPermission(name);
366 } else if (FilePermission.class.getName().equals(classname)) {
367 return new FilePermission(name, actions);
368 } else if (SerializablePermission.class.getName().equals(classname)) {
369 return new SerializablePermission(name, actions);
370 } else if (NetPermission.class.getName().equals(classname)) {
371 return new NetPermission(name, actions);
372 } else if (RuntimePermission.class.getName().equals(classname)) {
373 return new RuntimePermission(name, actions);
374 } else if (SocketPermission.class.getName().equals(classname)) {
375 return new SocketPermission(name, actions);
376 } else if (SQLPermission.class.getName().equals(classname)) {
377 return new SQLPermission(name, actions);
378 } else if (PropertyPermission.class.getName().equals(classname)) {
379 return new PropertyPermission(name, actions);
380 } else if (LoggingPermission.class.getName().equals(classname)) {
381 return new LoggingPermission(name, actions);
382 } else if (SSLPermission.class.getName().equals(classname)) {
383 return new SSLPermission(name, actions);
384 } else if (AuthPermission.class.getName().equals(classname)) {
385 return new AuthPermission(name, actions);
386 } else if (PrivateCredentialPermission.class.getName().equals(classname)) {
387 return new PrivateCredentialPermission(name, actions);
388 } else if (DelegationPermission.class.getName().equals(classname)) {
389 return new DelegationPermission(name, actions);
390 } else if (javax.security.auth.kerberos.ServicePermission.class.getName().equals(classname)) {
391 return new javax.security.auth.kerberos.ServicePermission(name, actions);
392 } else if (AudioPermission.class.getName().equals(classname)) {
393 return new AudioPermission(name, actions);
394 } else if (AdaptPermission.class.getName().equals(classname)) {
395 return new AdaptPermission(name, actions);
396 } else if (BundlePermission.class.getName().equals(classname)) {
397 return new BundlePermission(name, actions);
398 } else if (CapabilityPermission.class.getName().equals(classname)) {
399 return new CapabilityPermission(name, actions);
400 } else if (PackagePermission.class.getName().equals(classname)) {
401 return new PackagePermission(name, actions);
402 } else if (ServicePermission.class.getName().equals(classname)) {
403 return new ServicePermission(name, actions);
404 }
405
406 //AllPermission, SecurityPermission, UnresolvedPermission
407 //AWTPermission, AdminPermission(osgi), ReflectPermission not allowed
408 return null;
409
410 }
411 private static List<Permission> optimizePermissions(List<Permission> perms) {
412 Permissions permissions = listToPermissions(perms);
413 return permissionsToList(permissions);
414 }
415
416 private static List<Permission> permissionsToList(Permissions perms) {
417 List<Permission> permissions = new ArrayList<>();
418 Enumeration<Permission> e = perms.elements();
419 while (e.hasMoreElements()) {
420 permissions.add(e.nextElement());
421 }
422 return permissions;
423 }
424
425 private static Permissions listToPermissions(List<Permission> perms) {
426 Permissions permissions = new Permissions();
427 for (Permission perm : perms) {
428 permissions.add(perm);
429 }
430 return permissions;
431 }
432}
433