blob: 1fbb7c8c3e00937ac659e84a2323ca2f8697a641 [file] [log] [blame]
Brian O'Connor91d07982015-09-10 16:37:29 -07001/*
2 * Copyright 2015 Open Networking Laboratory
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
Changhoon Yoonb856b812015-08-10 03:47:19 +090016package org.onosproject.security.impl;
17
18
19import com.google.common.collect.ImmutableSet;
20import com.google.common.collect.Lists;
21import com.google.common.collect.Sets;
22import org.onosproject.security.AppPermission;
23import org.onosproject.app.ApplicationAdminService;
24import org.onosproject.app.ApplicationService;
25import org.onosproject.cfg.ComponentConfigService;
26import org.onosproject.cluster.ClusterAdminService;
27import org.onosproject.cluster.ClusterService;
28import org.onosproject.core.CoreService;
29import org.onosproject.cluster.LeadershipService;
30import org.onosproject.mastership.MastershipAdminService;
31import org.onosproject.mastership.MastershipService;
32import org.onosproject.net.device.DeviceAdminService;
33import org.onosproject.net.device.DeviceService;
34import org.onosproject.net.device.DeviceClockService;
35import org.onosproject.net.driver.DriverAdminService;
36import org.onosproject.net.driver.DriverService;
37import org.onosproject.net.flow.FlowRuleService;
38import org.onosproject.net.flowobjective.FlowObjectiveService;
39import org.onosproject.net.group.GroupService;
40import org.onosproject.net.host.HostAdminService;
41import org.onosproject.net.host.HostService;
42import org.onosproject.net.intent.IntentService;
43import org.onosproject.net.intent.IntentExtensionService;
44import org.onosproject.net.intent.IntentClockService;
45import org.onosproject.net.intent.PartitionService;
46import org.onosproject.net.link.LinkAdminService;
47import org.onosproject.net.link.LinkService;
48import org.onosproject.net.packet.PacketService;
49import org.onosproject.net.proxyarp.ProxyArpService;
50import org.onosproject.net.resource.link.LinkResourceService;
51import org.onosproject.net.statistic.StatisticService;
52import org.onosproject.net.topology.PathService;
53import org.onosproject.net.topology.TopologyService;
54import org.onosproject.security.SecurityAdminService;
55import org.onosproject.store.service.StorageAdminService;
56import org.onosproject.store.service.StorageService;
Changhoon Yoonb856b812015-08-10 03:47:19 +090057import org.osgi.framework.ServicePermission;
Changhoon Yoone71dfa42015-12-04 21:49:25 +090058import org.osgi.framework.AdminPermission;
Changhoon Yoonb856b812015-08-10 03:47:19 +090059import org.osgi.framework.AdaptPermission;
Changhoon Yoone71dfa42015-12-04 21:49:25 +090060import org.osgi.framework.CapabilityPermission;
61import org.osgi.framework.BundlePermission;
62import org.osgi.framework.PackagePermission;
Changhoon Yoonb856b812015-08-10 03:47:19 +090063import org.osgi.service.cm.ConfigurationPermission;
64
65import javax.net.ssl.SSLPermission;
66import javax.security.auth.AuthPermission;
67import javax.security.auth.PrivateCredentialPermission;
68import javax.security.auth.kerberos.DelegationPermission;
69import javax.sound.sampled.AudioPermission;
70import java.io.FilePermission;
71import java.io.SerializablePermission;
Changhoon Yoone71dfa42015-12-04 21:49:25 +090072import java.lang.reflect.ReflectPermission;
Changhoon Yoonb856b812015-08-10 03:47:19 +090073import java.net.NetPermission;
74import java.net.SocketPermission;
75import java.security.Permissions;
76import java.sql.SQLPermission;
77import java.util.ArrayList;
78import java.util.Enumeration;
79import java.util.HashSet;
80import java.util.List;
81import java.util.PropertyPermission;
82import java.util.Set;
83import java.util.concurrent.ConcurrentHashMap;
84import java.security.Permission;
85import java.util.logging.LoggingPermission;
86
87import static org.onosproject.security.AppPermission.Type.*;
88
89public final class DefaultPolicyBuilder {
90
91 protected static ConcurrentHashMap<AppPermission.Type,
92 Set<String>> serviceDirectory = getServiceDirectory();
93
94 protected static List<Permission> defaultPermissions = getDefaultPerms();
95 protected static List<Permission> adminServicePermissions = getAdminDefaultPerms();
96
97 private DefaultPolicyBuilder(){
98 }
99
100 public static List<Permission> getUserApplicationPermissions(Set<org.onosproject.security.Permission> permissions) {
101 List<Permission> perms = Lists.newArrayList();
102 perms.addAll(defaultPermissions);
103 perms.addAll(convertToJavaPermissions(permissions));
104 return optimizePermissions(perms);
105 }
106
107 public static List<Permission> getAdminApplicationPermissions(
108 Set<org.onosproject.security.Permission> permissions) {
109 List<Permission> perms = Lists.newArrayList();
110 perms.addAll(defaultPermissions);
111 perms.addAll(adminServicePermissions);
112 for (AppPermission.Type perm : serviceDirectory.keySet()) {
113 perms.add(new AppPermission(perm));
114 }
115 perms.addAll(convertToJavaPermissions(permissions));
116 return optimizePermissions(perms);
117 }
118
119 public static List<Permission> convertToJavaPermissions(Set<org.onosproject.security.Permission> permissions) {
120 List<Permission> result = Lists.newArrayList();
121 for (org.onosproject.security.Permission perm : permissions) {
122 Permission javaPerm = getPermission(perm);
123 if (javaPerm != null) {
124 if (javaPerm instanceof AppPermission) {
125 if (((AppPermission) javaPerm).getType() != null) {
126 AppPermission ap = (AppPermission) javaPerm;
127 result.add(ap);
128 if (serviceDirectory.containsKey(ap.getType())) {
129 for (String service : serviceDirectory.get(ap.getType())) {
130 result.add(new ServicePermission(service, ServicePermission.GET));
131 }
132 }
133 }
134 } else if (javaPerm instanceof ServicePermission) {
135 if (!javaPerm.getName().contains(SecurityAdminService.class.getName())) {
136 result.add(javaPerm);
137 }
138 } else {
139 result.add(javaPerm);
140 }
141
142 }
143 }
144 return result;
145 }
146
147 public static Set<org.onosproject.security.Permission> convertToOnosPermissions(List<Permission> permissions) {
148 Set<org.onosproject.security.Permission> result = Sets.newHashSet();
149 for (Permission perm : permissions) {
150 org.onosproject.security.Permission onosPerm = getOnosPermission(perm);
151 if (onosPerm != null) {
152 result.add(onosPerm);
153 }
154 }
155 return result;
156 }
157
158 public static List<Permission> getDefaultPerms() {
159 List<Permission> permSet = Lists.newArrayList();
160 permSet.add(new PackagePermission("*", PackagePermission.EXPORTONLY));
161 permSet.add(new PackagePermission("*", PackagePermission.IMPORT));
162 permSet.add(new AdaptPermission("*", AdaptPermission.ADAPT));
163 permSet.add(new ConfigurationPermission("*", ConfigurationPermission.CONFIGURE));
Changhoon Yoone71dfa42015-12-04 21:49:25 +0900164 permSet.add(new AdminPermission("*", AdminPermission.METADATA));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900165 return permSet;
166 }
167
168 private static List<Permission> getAdminDefaultPerms() {
169 List<Permission> permSet = Lists.newArrayList();
170 permSet.add(new ServicePermission(ApplicationAdminService.class.getName(), ServicePermission.GET));
171 permSet.add(new ServicePermission(ClusterAdminService.class.getName(), ServicePermission.GET));
172 permSet.add(new ServicePermission(MastershipAdminService.class.getName(), ServicePermission.GET));
173 permSet.add(new ServicePermission(DeviceAdminService.class.getName(), ServicePermission.GET));
174 permSet.add(new ServicePermission(HostAdminService.class.getName(), ServicePermission.GET));
175 permSet.add(new ServicePermission(LinkAdminService.class.getName(), ServicePermission.GET));
176 permSet.add(new ServicePermission(DriverAdminService.class.getName(), ServicePermission.GET));
177 permSet.add(new ServicePermission(StorageAdminService.class.getName(), ServicePermission.GET));
178// permSet.add(new ServicePermission(LabelResourceAdminService.class.getName(), ServicePermission.GET));
179// permSet.add(new ServicePermission(TunnelAdminService.class.getName(), ServicePermission.GET));
180 permSet.add(new ServicePermission(ApplicationService.class.getName(), ServicePermission.GET));
181 permSet.add(new ServicePermission(ComponentConfigService.class.getName(), ServicePermission.GET));
182 permSet.add(new ServicePermission(CoreService.class.getName(), ServicePermission.GET));
183 permSet.add(new ServicePermission(ClusterService.class.getName(), ServicePermission.GET));
184 permSet.add(new ServicePermission(LeadershipService.class.getName(), ServicePermission.GET));
185 permSet.add(new ServicePermission(MastershipService.class.getName(), ServicePermission.GET));
186 permSet.add(new ServicePermission(DeviceService.class.getName(), ServicePermission.GET));
187 permSet.add(new ServicePermission(DeviceClockService.class.getName(), ServicePermission.GET));
188 permSet.add(new ServicePermission(DriverService.class.getName(), ServicePermission.GET));
189 permSet.add(new ServicePermission(FlowRuleService.class.getName(), ServicePermission.GET));
190 permSet.add(new ServicePermission(FlowObjectiveService.class.getName(), ServicePermission.GET));
191 permSet.add(new ServicePermission(GroupService.class.getName(), ServicePermission.GET));
192 permSet.add(new ServicePermission(HostService.class.getName(), ServicePermission.GET));
193 permSet.add(new ServicePermission(IntentService.class.getName(), ServicePermission.GET));
194 permSet.add(new ServicePermission(IntentClockService.class.getName(), ServicePermission.GET));
195 permSet.add(new ServicePermission(IntentExtensionService.class.getName(), ServicePermission.GET));
196 permSet.add(new ServicePermission(PartitionService.class.getName(), ServicePermission.GET));
197 permSet.add(new ServicePermission(LinkService.class.getName(), ServicePermission.GET));
198 permSet.add(new ServicePermission(LinkResourceService.class.getName(), ServicePermission.GET));
199// permSet.add(new ServicePermission(LabelResourceService.class.getName(), ServicePermission.GET));
200 permSet.add(new ServicePermission(PacketService.class.getName(), ServicePermission.GET));
201 permSet.add(new ServicePermission(ProxyArpService.class.getName(), ServicePermission.GET));
202 permSet.add(new ServicePermission(StatisticService.class.getName(), ServicePermission.GET));
203 permSet.add(new ServicePermission(PathService.class.getName(), ServicePermission.GET));
204 permSet.add(new ServicePermission(TopologyService.class.getName(), ServicePermission.GET));
205// permSet.add(new ServicePermission(TunnelService.class.getName(), ServicePermission.GET));
206 permSet.add(new ServicePermission(StorageService.class.getName(), ServicePermission.GET));
207 return permSet;
208 }
209
210 public static Set<String> getNBServiceList() {
211 Set<String> permString = new HashSet<>();
212 for (Permission perm : getAdminDefaultPerms()) {
213 permString.add(perm.getName());
214 }
215 return permString;
216 }
217
218 private static ConcurrentHashMap<AppPermission.Type, Set<String>> getServiceDirectory() {
219
220 ConcurrentHashMap<AppPermission.Type, Set<String>> serviceDirectory = new ConcurrentHashMap<>();
221
222 serviceDirectory.put(APP_READ, ImmutableSet.of(
223 ApplicationService.class.getName(), CoreService.class.getName()));
224 serviceDirectory.put(APP_EVENT, ImmutableSet.of(
225 ApplicationService.class.getName(), CoreService.class.getName()));
226 serviceDirectory.put(CONFIG_READ, ImmutableSet.of(
227 ComponentConfigService.class.getName()));
228 serviceDirectory.put(CONFIG_WRITE, ImmutableSet.of(
229 ComponentConfigService.class.getName()));
230 serviceDirectory.put(CLUSTER_READ, ImmutableSet.of(
231 ClusterService.class.getName(), LeadershipService.class.getName(),
232 MastershipService.class.getName()));
233 serviceDirectory.put(CLUSTER_WRITE, ImmutableSet.of(
234 LeadershipService.class.getName(), MastershipService.class.getName()));
235 serviceDirectory.put(CLUSTER_EVENT, ImmutableSet.of(
236 ClusterService.class.getName(), LeadershipService.class.getName(),
237 MastershipService.class.getName()));
238 serviceDirectory.put(DEVICE_READ, ImmutableSet.of(
239 DeviceService.class.getName(), DeviceClockService.class.getName()));
240 serviceDirectory.put(DEVICE_EVENT, ImmutableSet.of(
241 DeviceService.class.getName()));
242 serviceDirectory.put(DRIVER_READ, ImmutableSet.of(
243 DriverService.class.getName()));
244 serviceDirectory.put(DRIVER_WRITE, ImmutableSet.of(
245 DriverService.class.getName()));
246 serviceDirectory.put(FLOWRULE_READ, ImmutableSet.of(
247 FlowRuleService.class.getName()));
248 serviceDirectory.put(FLOWRULE_WRITE, ImmutableSet.of(
249 FlowRuleService.class.getName(), FlowObjectiveService.class.getName()));
250 serviceDirectory.put(FLOWRULE_EVENT, ImmutableSet.of(
251 FlowRuleService.class.getName()));
252 serviceDirectory.put(GROUP_READ, ImmutableSet.of(
253 GroupService.class.getName()));
254 serviceDirectory.put(GROUP_WRITE, ImmutableSet.of(
255 GroupService.class.getName()));
256 serviceDirectory.put(GROUP_EVENT, ImmutableSet.of(
257 GroupService.class.getName()));
258 serviceDirectory.put(HOST_READ, ImmutableSet.of(
259 HostService.class.getName()));
260 serviceDirectory.put(HOST_WRITE, ImmutableSet.of(
261 HostService.class.getName()));
262 serviceDirectory.put(HOST_EVENT, ImmutableSet.of(
263 HostService.class.getName()));
264 serviceDirectory.put(INTENT_READ, ImmutableSet.of(
265 IntentService.class.getName(), PartitionService.class.getName(),
266 IntentClockService.class.getName()));
267 serviceDirectory.put(INTENT_WRITE, ImmutableSet.of(
268 IntentService.class.getName()));
269 serviceDirectory.put(INTENT_EVENT, ImmutableSet.of(
270 IntentService.class.getName()));
271// serviceDirectory.put(LINK_READ, ImmutableSet.of(
272// LinkService.class.getName(), LinkResourceService.class.getName(),
273// LabelResourceService.class.getName()));
274// serviceDirectory.put(LINK_WRITE, ImmutableSet.of(
275// LinkResourceService.class.getName(), LabelResourceService.class.getName()));
276// serviceDirectory.put(LINK_EVENT, ImmutableSet.of(
277// LinkService.class.getName(), LinkResourceService.class.getName(),
278// LabelResourceService.class.getName()));
279 serviceDirectory.put(PACKET_READ, ImmutableSet.of(
280 PacketService.class.getName(), ProxyArpService.class.getName()));
281 serviceDirectory.put(PACKET_WRITE, ImmutableSet.of(
282 PacketService.class.getName(), ProxyArpService.class.getName()));
283 serviceDirectory.put(PACKET_EVENT, ImmutableSet.of(
284 PacketService.class.getName()));
285 serviceDirectory.put(STATISTIC_READ, ImmutableSet.of(
286 StatisticService.class.getName()));
287 serviceDirectory.put(TOPOLOGY_READ, ImmutableSet.of(
288 TopologyService.class.getName(), PathService.class.getName()));
289 serviceDirectory.put(TOPOLOGY_EVENT, ImmutableSet.of(
290 TopologyService.class.getName()));
291// serviceDirectory.put(TUNNEL_READ, ImmutableSet.of(
292// TunnelService.class.getName()));
293// serviceDirectory.put(TUNNEL_WRITE, ImmutableSet.of(
294// TunnelService.class.getName()));
295// serviceDirectory.put(TUNNEL_EVENT, ImmutableSet.of(
296// TunnelService.class.getName()));
297 serviceDirectory.put(STORAGE_WRITE, ImmutableSet.of(
298 StorageService.class.getName()));
299
300 return serviceDirectory;
301 }
302
303
304 public static org.onosproject.security.Permission getOnosPermission(Permission permission) {
305 if (permission instanceof AppPermission) {
306 return new org.onosproject.security.Permission(AppPermission.class.getName(), permission.getName(), "");
307 } else if (permission instanceof FilePermission) {
308 return new org.onosproject.security.Permission(
309 FilePermission.class.getName(), permission.getName(), permission.getActions());
310 } else if (permission instanceof SerializablePermission) {
311 return new org.onosproject.security.Permission(
312 SerializablePermission.class.getName(), permission.getName(), permission.getActions());
313 } else if (permission instanceof NetPermission) {
314 return new org.onosproject.security.Permission(
315 NetPermission.class.getName(), permission.getName(), permission.getActions());
316 } else if (permission instanceof RuntimePermission) {
317 return new org.onosproject.security.Permission(
318 RuntimePermission.class.getName(), permission.getName(), permission.getActions());
319 } else if (permission instanceof SocketPermission) {
320 return new org.onosproject.security.Permission(
321 SocketPermission.class.getName(), permission.getName(), permission.getActions());
322 } else if (permission instanceof SQLPermission) {
323 return new org.onosproject.security.Permission(
324 SQLPermission.class.getName(), permission.getName(), permission.getActions());
325 } else if (permission instanceof PropertyPermission) {
326 return new org.onosproject.security.Permission(
327 PropertyPermission.class.getName(), permission.getName(), permission.getActions());
328 } else if (permission instanceof LoggingPermission) {
329 return new org.onosproject.security.Permission(
330 LoggingPermission.class.getName(), permission.getName(), permission.getActions());
331 } else if (permission instanceof SSLPermission) {
332 return new org.onosproject.security.Permission(
333 SSLPermission.class.getName(), permission.getName(), permission.getActions());
334 } else if (permission instanceof AuthPermission) {
335 return new org.onosproject.security.Permission(
336 AuthPermission.class.getName(), permission.getName(), permission.getActions());
337 } else if (permission instanceof PrivateCredentialPermission) {
338 return new org.onosproject.security.Permission(
339 PrivateCredentialPermission.class.getName(), permission.getName(), permission.getActions());
340 } else if (permission instanceof DelegationPermission) {
341 return new org.onosproject.security.Permission(
342 DelegationPermission.class.getName(), permission.getName(), permission.getActions());
343 } else if (permission instanceof javax.security.auth.kerberos.ServicePermission) {
344 return new org.onosproject.security.Permission(
345 javax.security.auth.kerberos.ServicePermission.class.getName(), permission.getName(),
346 permission.getActions());
347 } else if (permission instanceof AudioPermission) {
348 return new org.onosproject.security.Permission(
349 AudioPermission.class.getName(), permission.getName(), permission.getActions());
350 } else if (permission instanceof AdaptPermission) {
351 return new org.onosproject.security.Permission(
352 AdaptPermission.class.getName(), permission.getName(), permission.getActions());
353 } else if (permission instanceof BundlePermission) {
354 return new org.onosproject.security.Permission(
355 BundlePermission.class.getName(), permission.getName(), permission.getActions());
356 } else if (permission instanceof CapabilityPermission) {
357 return new org.onosproject.security.Permission(
358 CapabilityPermission.class.getName(), permission.getName(), permission.getActions());
359 } else if (permission instanceof PackagePermission) {
360 return new org.onosproject.security.Permission(
361 PackagePermission.class.getName(), permission.getName(), permission.getActions());
362 } else if (permission instanceof ServicePermission) {
363 return new org.onosproject.security.Permission(
364 ServicePermission.class.getName(), permission.getName(), permission.getActions());
Changhoon Yoone71dfa42015-12-04 21:49:25 +0900365 } else if (permission instanceof AdminPermission) {
366 return new org.onosproject.security.Permission(
367 AdminPermission.class.getName(), permission.getName(), permission.getActions());
368 } else if (permission instanceof ConfigurationPermission) {
369 return new org.onosproject.security.Permission(
370 ConfigurationPermission.class.getName(), permission.getName(), permission.getActions());
Changhoon Yoonb856b812015-08-10 03:47:19 +0900371 }
372 return null;
373 }
374
375 private static Permission getPermission(org.onosproject.security.Permission permission) {
376
377 String classname = permission.getClassName();
378 String name = permission.getName();
379 String actions = permission.getActions();
380
381 if (classname == null || name == null) {
382 return null;
383 }
384 classname = classname.trim();
385 name = name.trim();
386 actions = actions.trim();
387
388 if (AppPermission.class.getName().equals(classname)) {
389 return new AppPermission(name);
390 } else if (FilePermission.class.getName().equals(classname)) {
391 return new FilePermission(name, actions);
392 } else if (SerializablePermission.class.getName().equals(classname)) {
393 return new SerializablePermission(name, actions);
394 } else if (NetPermission.class.getName().equals(classname)) {
395 return new NetPermission(name, actions);
396 } else if (RuntimePermission.class.getName().equals(classname)) {
397 return new RuntimePermission(name, actions);
398 } else if (SocketPermission.class.getName().equals(classname)) {
399 return new SocketPermission(name, actions);
400 } else if (SQLPermission.class.getName().equals(classname)) {
401 return new SQLPermission(name, actions);
402 } else if (PropertyPermission.class.getName().equals(classname)) {
403 return new PropertyPermission(name, actions);
404 } else if (LoggingPermission.class.getName().equals(classname)) {
405 return new LoggingPermission(name, actions);
406 } else if (SSLPermission.class.getName().equals(classname)) {
407 return new SSLPermission(name, actions);
408 } else if (AuthPermission.class.getName().equals(classname)) {
409 return new AuthPermission(name, actions);
410 } else if (PrivateCredentialPermission.class.getName().equals(classname)) {
411 return new PrivateCredentialPermission(name, actions);
412 } else if (DelegationPermission.class.getName().equals(classname)) {
413 return new DelegationPermission(name, actions);
414 } else if (javax.security.auth.kerberos.ServicePermission.class.getName().equals(classname)) {
415 return new javax.security.auth.kerberos.ServicePermission(name, actions);
416 } else if (AudioPermission.class.getName().equals(classname)) {
417 return new AudioPermission(name, actions);
418 } else if (AdaptPermission.class.getName().equals(classname)) {
419 return new AdaptPermission(name, actions);
420 } else if (BundlePermission.class.getName().equals(classname)) {
421 return new BundlePermission(name, actions);
422 } else if (CapabilityPermission.class.getName().equals(classname)) {
423 return new CapabilityPermission(name, actions);
424 } else if (PackagePermission.class.getName().equals(classname)) {
425 return new PackagePermission(name, actions);
426 } else if (ServicePermission.class.getName().equals(classname)) {
427 return new ServicePermission(name, actions);
Changhoon Yoone71dfa42015-12-04 21:49:25 +0900428 } else if (AdminPermission.class.getName().equals(classname)) {
429 return new AdminPermission(name, actions);
430 } else if (ConfigurationPermission.class.getName().equals(classname)) {
431 return new ConfigurationPermission(name, actions);
432 } else if (ReflectPermission.class.getName().equals(classname)) {
433 return new ReflectPermission(name, actions);
Changhoon Yoonb856b812015-08-10 03:47:19 +0900434 }
435
436 //AllPermission, SecurityPermission, UnresolvedPermission
Changhoon Yoone71dfa42015-12-04 21:49:25 +0900437 //AWTPermission, ReflectPermission not allowed
Changhoon Yoonb856b812015-08-10 03:47:19 +0900438 return null;
439
440 }
441 private static List<Permission> optimizePermissions(List<Permission> perms) {
442 Permissions permissions = listToPermissions(perms);
443 return permissionsToList(permissions);
444 }
445
446 private static List<Permission> permissionsToList(Permissions perms) {
447 List<Permission> permissions = new ArrayList<>();
448 Enumeration<Permission> e = perms.elements();
449 while (e.hasMoreElements()) {
450 permissions.add(e.nextElement());
451 }
452 return permissions;
453 }
454
455 private static Permissions listToPermissions(List<Permission> perms) {
456 Permissions permissions = new Permissions();
457 for (Permission perm : perms) {
458 permissions.add(perm);
459 }
460 return permissions;
461 }
Changhoon Yoone71dfa42015-12-04 21:49:25 +0900462}