blob: 8877e56e1e0947c39e8afc37a84c3e20beb53569 [file] [log] [blame]
Brian O'Connor91d07982015-09-10 16:37:29 -07001/*
Brian O'Connora09fe5b2017-08-03 21:12:30 -07002 * Copyright 2015-present Open Networking Foundation
Brian O'Connor91d07982015-09-10 16:37:29 -07003 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
Changhoon Yoonb856b812015-08-10 03:47:19 +090016package org.onosproject.security.impl;
17
18
19import com.google.common.collect.ImmutableSet;
20import com.google.common.collect.Lists;
21import com.google.common.collect.Sets;
Heedo Kang4a47a302016-02-29 17:40:23 +090022import org.onosproject.cluster.ClusterAdminService;
23import org.onosproject.cluster.ClusterMetadataService;
24import org.onosproject.cluster.ClusterService;
25import org.onosproject.cluster.ClusterMetadataAdminService;
26import org.onosproject.cluster.LeadershipService;
27import org.onosproject.cluster.LeadershipAdminService;
28import org.onosproject.codec.CodecService;
29import org.onosproject.event.EventDeliveryService;
30import org.onosproject.mastership.MastershipTermService;
31import org.onosproject.net.config.BasicNetworkConfigService;
32import org.onosproject.net.config.NetworkConfigService;
33import org.onosproject.net.edge.EdgePortService;
34import org.onosproject.net.key.DeviceKeyAdminService;
35import org.onosproject.net.key.DeviceKeyService;
Sho SHIMIZUe18cb122016-02-22 21:04:56 -080036import org.onosproject.net.resource.ResourceAdminService;
37import org.onosproject.net.resource.ResourceService;
Heedo Kang4a47a302016-02-29 17:40:23 +090038import org.onosproject.net.region.RegionAdminService;
39import org.onosproject.net.region.RegionService;
40import org.onosproject.net.statistic.FlowStatisticService;
41import org.onosproject.persistence.PersistenceService;
Changhoon Yoonb856b812015-08-10 03:47:19 +090042import org.onosproject.security.AppPermission;
43import org.onosproject.app.ApplicationAdminService;
44import org.onosproject.app.ApplicationService;
45import org.onosproject.cfg.ComponentConfigService;
Changhoon Yoonb856b812015-08-10 03:47:19 +090046import org.onosproject.core.CoreService;
Changhoon Yoonb856b812015-08-10 03:47:19 +090047import org.onosproject.mastership.MastershipAdminService;
48import org.onosproject.mastership.MastershipService;
49import org.onosproject.net.device.DeviceAdminService;
50import org.onosproject.net.device.DeviceService;
51import org.onosproject.net.device.DeviceClockService;
52import org.onosproject.net.driver.DriverAdminService;
53import org.onosproject.net.driver.DriverService;
54import org.onosproject.net.flow.FlowRuleService;
55import org.onosproject.net.flowobjective.FlowObjectiveService;
56import org.onosproject.net.group.GroupService;
57import org.onosproject.net.host.HostAdminService;
58import org.onosproject.net.host.HostService;
59import org.onosproject.net.intent.IntentService;
60import org.onosproject.net.intent.IntentExtensionService;
61import org.onosproject.net.intent.IntentClockService;
Madan Jampani3b8101a2016-09-15 13:22:01 -070062import org.onosproject.net.intent.WorkPartitionService;
Changhoon Yoonb856b812015-08-10 03:47:19 +090063import org.onosproject.net.link.LinkAdminService;
64import org.onosproject.net.link.LinkService;
65import org.onosproject.net.packet.PacketService;
Changhoon Yoonb856b812015-08-10 03:47:19 +090066import org.onosproject.net.statistic.StatisticService;
67import org.onosproject.net.topology.PathService;
68import org.onosproject.net.topology.TopologyService;
69import org.onosproject.security.SecurityAdminService;
Heedo Kang4a47a302016-02-29 17:40:23 +090070import org.onosproject.store.cluster.messaging.ClusterCommunicationService;
71import org.onosproject.store.cluster.messaging.MessagingService;
72import org.onosproject.store.primitives.PartitionAdminService;
73import org.onosproject.store.primitives.PartitionService;
74import org.onosproject.store.service.LogicalClockService;
Changhoon Yoonb856b812015-08-10 03:47:19 +090075import org.onosproject.store.service.StorageAdminService;
76import org.onosproject.store.service.StorageService;
Heedo Kang4a47a302016-02-29 17:40:23 +090077import org.onosproject.ui.UiExtensionService;
Changhoon Yoonb856b812015-08-10 03:47:19 +090078import org.osgi.framework.ServicePermission;
Changhoon Yoone71dfa42015-12-04 21:49:25 +090079import org.osgi.framework.AdminPermission;
Changhoon Yoonb856b812015-08-10 03:47:19 +090080import org.osgi.framework.AdaptPermission;
Changhoon Yoone71dfa42015-12-04 21:49:25 +090081import org.osgi.framework.CapabilityPermission;
82import org.osgi.framework.BundlePermission;
83import org.osgi.framework.PackagePermission;
Changhoon Yoonb856b812015-08-10 03:47:19 +090084import org.osgi.service.cm.ConfigurationPermission;
85
86import javax.net.ssl.SSLPermission;
87import javax.security.auth.AuthPermission;
88import javax.security.auth.PrivateCredentialPermission;
89import javax.security.auth.kerberos.DelegationPermission;
90import javax.sound.sampled.AudioPermission;
91import java.io.FilePermission;
92import java.io.SerializablePermission;
Changhoon Yoone71dfa42015-12-04 21:49:25 +090093import java.lang.reflect.ReflectPermission;
Changhoon Yoonb856b812015-08-10 03:47:19 +090094import java.net.NetPermission;
95import java.net.SocketPermission;
96import java.security.Permissions;
97import java.sql.SQLPermission;
98import java.util.ArrayList;
99import java.util.Enumeration;
100import java.util.HashSet;
101import java.util.List;
102import java.util.PropertyPermission;
103import java.util.Set;
104import java.util.concurrent.ConcurrentHashMap;
105import java.security.Permission;
106import java.util.logging.LoggingPermission;
107
108import static org.onosproject.security.AppPermission.Type.*;
109
110public final class DefaultPolicyBuilder {
111
112 protected static ConcurrentHashMap<AppPermission.Type,
113 Set<String>> serviceDirectory = getServiceDirectory();
114
115 protected static List<Permission> defaultPermissions = getDefaultPerms();
116 protected static List<Permission> adminServicePermissions = getAdminDefaultPerms();
117
118 private DefaultPolicyBuilder(){
119 }
120
121 public static List<Permission> getUserApplicationPermissions(Set<org.onosproject.security.Permission> permissions) {
122 List<Permission> perms = Lists.newArrayList();
123 perms.addAll(defaultPermissions);
124 perms.addAll(convertToJavaPermissions(permissions));
125 return optimizePermissions(perms);
126 }
127
128 public static List<Permission> getAdminApplicationPermissions(
129 Set<org.onosproject.security.Permission> permissions) {
130 List<Permission> perms = Lists.newArrayList();
131 perms.addAll(defaultPermissions);
132 perms.addAll(adminServicePermissions);
133 for (AppPermission.Type perm : serviceDirectory.keySet()) {
134 perms.add(new AppPermission(perm));
135 }
136 perms.addAll(convertToJavaPermissions(permissions));
137 return optimizePermissions(perms);
138 }
139
140 public static List<Permission> convertToJavaPermissions(Set<org.onosproject.security.Permission> permissions) {
141 List<Permission> result = Lists.newArrayList();
142 for (org.onosproject.security.Permission perm : permissions) {
143 Permission javaPerm = getPermission(perm);
144 if (javaPerm != null) {
145 if (javaPerm instanceof AppPermission) {
146 if (((AppPermission) javaPerm).getType() != null) {
147 AppPermission ap = (AppPermission) javaPerm;
148 result.add(ap);
149 if (serviceDirectory.containsKey(ap.getType())) {
150 for (String service : serviceDirectory.get(ap.getType())) {
151 result.add(new ServicePermission(service, ServicePermission.GET));
152 }
153 }
154 }
155 } else if (javaPerm instanceof ServicePermission) {
156 if (!javaPerm.getName().contains(SecurityAdminService.class.getName())) {
157 result.add(javaPerm);
158 }
159 } else {
160 result.add(javaPerm);
161 }
162
163 }
164 }
165 return result;
166 }
167
168 public static Set<org.onosproject.security.Permission> convertToOnosPermissions(List<Permission> permissions) {
169 Set<org.onosproject.security.Permission> result = Sets.newHashSet();
170 for (Permission perm : permissions) {
171 org.onosproject.security.Permission onosPerm = getOnosPermission(perm);
172 if (onosPerm != null) {
173 result.add(onosPerm);
174 }
175 }
176 return result;
177 }
178
179 public static List<Permission> getDefaultPerms() {
180 List<Permission> permSet = Lists.newArrayList();
181 permSet.add(new PackagePermission("*", PackagePermission.EXPORTONLY));
182 permSet.add(new PackagePermission("*", PackagePermission.IMPORT));
183 permSet.add(new AdaptPermission("*", AdaptPermission.ADAPT));
184 permSet.add(new ConfigurationPermission("*", ConfigurationPermission.CONFIGURE));
Changhoon Yoone71dfa42015-12-04 21:49:25 +0900185 permSet.add(new AdminPermission("*", AdminPermission.METADATA));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900186 return permSet;
187 }
188
189 private static List<Permission> getAdminDefaultPerms() {
190 List<Permission> permSet = Lists.newArrayList();
191 permSet.add(new ServicePermission(ApplicationAdminService.class.getName(), ServicePermission.GET));
192 permSet.add(new ServicePermission(ClusterAdminService.class.getName(), ServicePermission.GET));
Heedo Kang4a47a302016-02-29 17:40:23 +0900193 permSet.add(new ServicePermission(LeadershipAdminService.class.getName(), ServicePermission.GET));
194 permSet.add(new ServicePermission(ClusterMetadataAdminService.class.getName(), ServicePermission.GET));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900195 permSet.add(new ServicePermission(MastershipAdminService.class.getName(), ServicePermission.GET));
196 permSet.add(new ServicePermission(DeviceAdminService.class.getName(), ServicePermission.GET));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900197 permSet.add(new ServicePermission(DriverAdminService.class.getName(), ServicePermission.GET));
Heedo Kang4a47a302016-02-29 17:40:23 +0900198 permSet.add(new ServicePermission(HostAdminService.class.getName(), ServicePermission.GET));
199 permSet.add(new ServicePermission(DeviceKeyAdminService.class.getName(), ServicePermission.GET));
200 permSet.add(new ServicePermission(LinkAdminService.class.getName(), ServicePermission.GET));
201 permSet.add(new ServicePermission(ResourceAdminService.class.getName(), ServicePermission.GET));
202 permSet.add(new ServicePermission(RegionAdminService.class.getName(), ServicePermission.GET));
203 permSet.add(new ServicePermission(PartitionAdminService.class.getName(), ServicePermission.GET));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900204 permSet.add(new ServicePermission(StorageAdminService.class.getName(), ServicePermission.GET));
Heedo Kang4a47a302016-02-29 17:40:23 +0900205
Changhoon Yoonb856b812015-08-10 03:47:19 +0900206 permSet.add(new ServicePermission(ApplicationService.class.getName(), ServicePermission.GET));
207 permSet.add(new ServicePermission(ComponentConfigService.class.getName(), ServicePermission.GET));
Heedo Kang4a47a302016-02-29 17:40:23 +0900208 permSet.add(new ServicePermission(ClusterMetadataService.class.getName(), ServicePermission.GET));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900209 permSet.add(new ServicePermission(ClusterService.class.getName(), ServicePermission.GET));
210 permSet.add(new ServicePermission(LeadershipService.class.getName(), ServicePermission.GET));
Heedo Kang4a47a302016-02-29 17:40:23 +0900211 permSet.add(new ServicePermission(CodecService.class.getName(), ServicePermission.GET));
212 permSet.add(new ServicePermission(CoreService.class.getName(), ServicePermission.GET));
213 permSet.add(new ServicePermission(EventDeliveryService.class.getName(), ServicePermission.GET));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900214 permSet.add(new ServicePermission(MastershipService.class.getName(), ServicePermission.GET));
Heedo Kang4a47a302016-02-29 17:40:23 +0900215 permSet.add(new ServicePermission(MastershipTermService.class.getName(), ServicePermission.GET));
216 permSet.add(new ServicePermission(BasicNetworkConfigService.class.getName(), ServicePermission.GET));
217 permSet.add(new ServicePermission(NetworkConfigService.class.getName(), ServicePermission.GET));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900218 permSet.add(new ServicePermission(DeviceService.class.getName(), ServicePermission.GET));
219 permSet.add(new ServicePermission(DeviceClockService.class.getName(), ServicePermission.GET));
220 permSet.add(new ServicePermission(DriverService.class.getName(), ServicePermission.GET));
Heedo Kang4a47a302016-02-29 17:40:23 +0900221 permSet.add(new ServicePermission(EdgePortService.class.getName(), ServicePermission.GET));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900222 permSet.add(new ServicePermission(FlowRuleService.class.getName(), ServicePermission.GET));
223 permSet.add(new ServicePermission(FlowObjectiveService.class.getName(), ServicePermission.GET));
224 permSet.add(new ServicePermission(GroupService.class.getName(), ServicePermission.GET));
225 permSet.add(new ServicePermission(HostService.class.getName(), ServicePermission.GET));
226 permSet.add(new ServicePermission(IntentService.class.getName(), ServicePermission.GET));
227 permSet.add(new ServicePermission(IntentClockService.class.getName(), ServicePermission.GET));
228 permSet.add(new ServicePermission(IntentExtensionService.class.getName(), ServicePermission.GET));
Madan Jampani3b8101a2016-09-15 13:22:01 -0700229 permSet.add(new ServicePermission(WorkPartitionService.class.getName(), ServicePermission.GET));
Heedo Kang4a47a302016-02-29 17:40:23 +0900230 permSet.add(new ServicePermission(DeviceKeyService.class.getName(), ServicePermission.GET));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900231 permSet.add(new ServicePermission(LinkService.class.getName(), ServicePermission.GET));
Heedo Kang4a47a302016-02-29 17:40:23 +0900232// permSet.add(new ServicePermission(MulticastRouteService.class.getName(), ServicePermission.GET));
233// permSet.add(new ServicePermission(MeterService.class.getName(), ServicePermission.GET));
234 permSet.add(new ServicePermission(ResourceService.class.getName(), ServicePermission.GET));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900235 permSet.add(new ServicePermission(PacketService.class.getName(), ServicePermission.GET));
Heedo Kang4a47a302016-02-29 17:40:23 +0900236 permSet.add(new ServicePermission(RegionService.class.getName(), ServicePermission.GET));
237// permSet.add(new ServicePermission(LinkResourceService.class.getName(), ServicePermission.GET));
238 permSet.add(new ServicePermission(FlowStatisticService.class.getName(), ServicePermission.GET));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900239 permSet.add(new ServicePermission(StatisticService.class.getName(), ServicePermission.GET));
240 permSet.add(new ServicePermission(PathService.class.getName(), ServicePermission.GET));
241 permSet.add(new ServicePermission(TopologyService.class.getName(), ServicePermission.GET));
Heedo Kang4a47a302016-02-29 17:40:23 +0900242 permSet.add(new ServicePermission(PersistenceService.class.getName(), ServicePermission.GET));
243// permSet.add(new ServicePermission(ApiDocService.class.getName(), ServicePermission.GET));
244 permSet.add(new ServicePermission(ClusterCommunicationService.class.getName(), ServicePermission.GET));
245 permSet.add(new ServicePermission(MessagingService.class.getName(), ServicePermission.GET));
246 permSet.add(new ServicePermission(PartitionService.class.getName(), ServicePermission.GET));
247 permSet.add(new ServicePermission(LogicalClockService.class.getName(), ServicePermission.GET));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900248 permSet.add(new ServicePermission(StorageService.class.getName(), ServicePermission.GET));
Heedo Kang4a47a302016-02-29 17:40:23 +0900249 permSet.add(new ServicePermission(UiExtensionService.class.getName(), ServicePermission.GET));
250
Changhoon Yoonb856b812015-08-10 03:47:19 +0900251 return permSet;
252 }
253
254 public static Set<String> getNBServiceList() {
255 Set<String> permString = new HashSet<>();
256 for (Permission perm : getAdminDefaultPerms()) {
257 permString.add(perm.getName());
258 }
259 return permString;
260 }
261
262 private static ConcurrentHashMap<AppPermission.Type, Set<String>> getServiceDirectory() {
263
264 ConcurrentHashMap<AppPermission.Type, Set<String>> serviceDirectory = new ConcurrentHashMap<>();
265
266 serviceDirectory.put(APP_READ, ImmutableSet.of(
267 ApplicationService.class.getName(), CoreService.class.getName()));
268 serviceDirectory.put(APP_EVENT, ImmutableSet.of(
269 ApplicationService.class.getName(), CoreService.class.getName()));
Heedo Kang4a47a302016-02-29 17:40:23 +0900270 serviceDirectory.put(APP_WRITE, ImmutableSet.of(
271 CoreService.class.getName()));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900272 serviceDirectory.put(CONFIG_READ, ImmutableSet.of(
Heedo Kang4a47a302016-02-29 17:40:23 +0900273 ComponentConfigService.class.getName(), NetworkConfigService.class.getName()));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900274 serviceDirectory.put(CONFIG_WRITE, ImmutableSet.of(
Heedo Kang4a47a302016-02-29 17:40:23 +0900275 ComponentConfigService.class.getName(), NetworkConfigService.class.getName()));
276 serviceDirectory.put(CONFIG_EVENT, ImmutableSet.of(
277 NetworkConfigService.class.getName()));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900278 serviceDirectory.put(CLUSTER_READ, ImmutableSet.of(
279 ClusterService.class.getName(), LeadershipService.class.getName(),
Heedo Kang4a47a302016-02-29 17:40:23 +0900280 MastershipService.class.getName(), ClusterMetadataService.class.getName(),
281 MastershipTermService.class.getName()));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900282 serviceDirectory.put(CLUSTER_WRITE, ImmutableSet.of(
Heedo Kang4a47a302016-02-29 17:40:23 +0900283 LeadershipService.class.getName(), MastershipService.class.getName(),
284 ClusterCommunicationService.class.getName(), MessagingService.class.getName()));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900285 serviceDirectory.put(CLUSTER_EVENT, ImmutableSet.of(
286 ClusterService.class.getName(), LeadershipService.class.getName(),
287 MastershipService.class.getName()));
288 serviceDirectory.put(DEVICE_READ, ImmutableSet.of(
289 DeviceService.class.getName(), DeviceClockService.class.getName()));
290 serviceDirectory.put(DEVICE_EVENT, ImmutableSet.of(
291 DeviceService.class.getName()));
292 serviceDirectory.put(DRIVER_READ, ImmutableSet.of(
293 DriverService.class.getName()));
294 serviceDirectory.put(DRIVER_WRITE, ImmutableSet.of(
295 DriverService.class.getName()));
296 serviceDirectory.put(FLOWRULE_READ, ImmutableSet.of(
297 FlowRuleService.class.getName()));
298 serviceDirectory.put(FLOWRULE_WRITE, ImmutableSet.of(
299 FlowRuleService.class.getName(), FlowObjectiveService.class.getName()));
300 serviceDirectory.put(FLOWRULE_EVENT, ImmutableSet.of(
301 FlowRuleService.class.getName()));
302 serviceDirectory.put(GROUP_READ, ImmutableSet.of(
303 GroupService.class.getName()));
304 serviceDirectory.put(GROUP_WRITE, ImmutableSet.of(
305 GroupService.class.getName()));
306 serviceDirectory.put(GROUP_EVENT, ImmutableSet.of(
307 GroupService.class.getName()));
308 serviceDirectory.put(HOST_READ, ImmutableSet.of(
309 HostService.class.getName()));
310 serviceDirectory.put(HOST_WRITE, ImmutableSet.of(
311 HostService.class.getName()));
312 serviceDirectory.put(HOST_EVENT, ImmutableSet.of(
313 HostService.class.getName()));
314 serviceDirectory.put(INTENT_READ, ImmutableSet.of(
Madan Jampani3b8101a2016-09-15 13:22:01 -0700315 IntentService.class.getName(), WorkPartitionService.class.getName(),
Heedo Kang4a47a302016-02-29 17:40:23 +0900316 IntentClockService.class.getName(), IntentExtensionService.class.getName()));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900317 serviceDirectory.put(INTENT_WRITE, ImmutableSet.of(
Heedo Kang4a47a302016-02-29 17:40:23 +0900318 IntentService.class.getName(), IntentExtensionService.class.getName()));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900319 serviceDirectory.put(INTENT_EVENT, ImmutableSet.of(
Madan Jampani3b8101a2016-09-15 13:22:01 -0700320 IntentService.class.getName(), WorkPartitionService.class.getName()));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900321// serviceDirectory.put(LINK_READ, ImmutableSet.of(
322// LinkService.class.getName(), LinkResourceService.class.getName(),
323// LabelResourceService.class.getName()));
324// serviceDirectory.put(LINK_WRITE, ImmutableSet.of(
325// LinkResourceService.class.getName(), LabelResourceService.class.getName()));
326// serviceDirectory.put(LINK_EVENT, ImmutableSet.of(
327// LinkService.class.getName(), LinkResourceService.class.getName(),
328// LabelResourceService.class.getName()));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900329 serviceDirectory.put(PACKET_EVENT, ImmutableSet.of(
330 PacketService.class.getName()));
331 serviceDirectory.put(STATISTIC_READ, ImmutableSet.of(
Heedo Kang4a47a302016-02-29 17:40:23 +0900332 StatisticService.class.getName(), FlowStatisticService.class.getName()));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900333 serviceDirectory.put(TOPOLOGY_READ, ImmutableSet.of(
Heedo Kang4a47a302016-02-29 17:40:23 +0900334 TopologyService.class.getName(), PathService.class.getName(),
335 EdgePortService.class.getName()));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900336 serviceDirectory.put(TOPOLOGY_EVENT, ImmutableSet.of(
337 TopologyService.class.getName()));
338// serviceDirectory.put(TUNNEL_READ, ImmutableSet.of(
339// TunnelService.class.getName()));
340// serviceDirectory.put(TUNNEL_WRITE, ImmutableSet.of(
341// TunnelService.class.getName()));
342// serviceDirectory.put(TUNNEL_EVENT, ImmutableSet.of(
343// TunnelService.class.getName()));
344 serviceDirectory.put(STORAGE_WRITE, ImmutableSet.of(
345 StorageService.class.getName()));
Heedo Kang4a47a302016-02-29 17:40:23 +0900346 serviceDirectory.put(CODEC_READ, ImmutableSet.of(
347 CodecService.class.getName()));
348 serviceDirectory.put(CODEC_WRITE, ImmutableSet.of(
349 CodecService.class.getName()));
350 serviceDirectory.put(EVENT_READ, ImmutableSet.of(
351 EventDeliveryService.class.getName()));
352 serviceDirectory.put(EVENT_WRITE, ImmutableSet.of(
353 EventDeliveryService.class.getName()));
354 serviceDirectory.put(RESOURCE_READ, ImmutableSet.of(
355 ResourceService.class.getName()));
356 serviceDirectory.put(RESOURCE_WRITE, ImmutableSet.of(
357 ResourceService.class.getName()));
358 serviceDirectory.put(RESOURCE_EVENT, ImmutableSet.of(
359 ResourceService.class.getName()));
360 serviceDirectory.put(REGION_READ, ImmutableSet.of(
361 RegionService.class.getName()));
362 serviceDirectory.put(PERSISTENCE_WRITE, ImmutableSet.of(
363 PersistenceService.class.getName()));
364 serviceDirectory.put(PARTITION_READ, ImmutableSet.of(
365 PartitionService.class.getName()));
366 serviceDirectory.put(PARTITION_EVENT, ImmutableSet.of(
367 PartitionService.class.getName()));
368 serviceDirectory.put(CLOCK_WRITE, ImmutableSet.of(
369 LogicalClockService.class.getName()));
Changhoon Yoonb856b812015-08-10 03:47:19 +0900370
371 return serviceDirectory;
372 }
373
374
375 public static org.onosproject.security.Permission getOnosPermission(Permission permission) {
376 if (permission instanceof AppPermission) {
377 return new org.onosproject.security.Permission(AppPermission.class.getName(), permission.getName(), "");
378 } else if (permission instanceof FilePermission) {
379 return new org.onosproject.security.Permission(
380 FilePermission.class.getName(), permission.getName(), permission.getActions());
381 } else if (permission instanceof SerializablePermission) {
382 return new org.onosproject.security.Permission(
383 SerializablePermission.class.getName(), permission.getName(), permission.getActions());
384 } else if (permission instanceof NetPermission) {
385 return new org.onosproject.security.Permission(
386 NetPermission.class.getName(), permission.getName(), permission.getActions());
387 } else if (permission instanceof RuntimePermission) {
388 return new org.onosproject.security.Permission(
389 RuntimePermission.class.getName(), permission.getName(), permission.getActions());
390 } else if (permission instanceof SocketPermission) {
391 return new org.onosproject.security.Permission(
392 SocketPermission.class.getName(), permission.getName(), permission.getActions());
393 } else if (permission instanceof SQLPermission) {
394 return new org.onosproject.security.Permission(
395 SQLPermission.class.getName(), permission.getName(), permission.getActions());
396 } else if (permission instanceof PropertyPermission) {
397 return new org.onosproject.security.Permission(
398 PropertyPermission.class.getName(), permission.getName(), permission.getActions());
399 } else if (permission instanceof LoggingPermission) {
400 return new org.onosproject.security.Permission(
401 LoggingPermission.class.getName(), permission.getName(), permission.getActions());
402 } else if (permission instanceof SSLPermission) {
403 return new org.onosproject.security.Permission(
404 SSLPermission.class.getName(), permission.getName(), permission.getActions());
405 } else if (permission instanceof AuthPermission) {
406 return new org.onosproject.security.Permission(
407 AuthPermission.class.getName(), permission.getName(), permission.getActions());
408 } else if (permission instanceof PrivateCredentialPermission) {
409 return new org.onosproject.security.Permission(
410 PrivateCredentialPermission.class.getName(), permission.getName(), permission.getActions());
411 } else if (permission instanceof DelegationPermission) {
412 return new org.onosproject.security.Permission(
413 DelegationPermission.class.getName(), permission.getName(), permission.getActions());
414 } else if (permission instanceof javax.security.auth.kerberos.ServicePermission) {
415 return new org.onosproject.security.Permission(
416 javax.security.auth.kerberos.ServicePermission.class.getName(), permission.getName(),
417 permission.getActions());
418 } else if (permission instanceof AudioPermission) {
419 return new org.onosproject.security.Permission(
420 AudioPermission.class.getName(), permission.getName(), permission.getActions());
421 } else if (permission instanceof AdaptPermission) {
422 return new org.onosproject.security.Permission(
423 AdaptPermission.class.getName(), permission.getName(), permission.getActions());
424 } else if (permission instanceof BundlePermission) {
425 return new org.onosproject.security.Permission(
426 BundlePermission.class.getName(), permission.getName(), permission.getActions());
427 } else if (permission instanceof CapabilityPermission) {
428 return new org.onosproject.security.Permission(
429 CapabilityPermission.class.getName(), permission.getName(), permission.getActions());
430 } else if (permission instanceof PackagePermission) {
431 return new org.onosproject.security.Permission(
432 PackagePermission.class.getName(), permission.getName(), permission.getActions());
433 } else if (permission instanceof ServicePermission) {
434 return new org.onosproject.security.Permission(
435 ServicePermission.class.getName(), permission.getName(), permission.getActions());
Changhoon Yoone71dfa42015-12-04 21:49:25 +0900436 } else if (permission instanceof AdminPermission) {
437 return new org.onosproject.security.Permission(
438 AdminPermission.class.getName(), permission.getName(), permission.getActions());
439 } else if (permission instanceof ConfigurationPermission) {
440 return new org.onosproject.security.Permission(
441 ConfigurationPermission.class.getName(), permission.getName(), permission.getActions());
Changhoon Yoonb856b812015-08-10 03:47:19 +0900442 }
443 return null;
444 }
445
446 private static Permission getPermission(org.onosproject.security.Permission permission) {
447
448 String classname = permission.getClassName();
449 String name = permission.getName();
450 String actions = permission.getActions();
451
452 if (classname == null || name == null) {
453 return null;
454 }
455 classname = classname.trim();
456 name = name.trim();
457 actions = actions.trim();
458
459 if (AppPermission.class.getName().equals(classname)) {
460 return new AppPermission(name);
461 } else if (FilePermission.class.getName().equals(classname)) {
462 return new FilePermission(name, actions);
463 } else if (SerializablePermission.class.getName().equals(classname)) {
464 return new SerializablePermission(name, actions);
465 } else if (NetPermission.class.getName().equals(classname)) {
466 return new NetPermission(name, actions);
467 } else if (RuntimePermission.class.getName().equals(classname)) {
468 return new RuntimePermission(name, actions);
469 } else if (SocketPermission.class.getName().equals(classname)) {
470 return new SocketPermission(name, actions);
471 } else if (SQLPermission.class.getName().equals(classname)) {
472 return new SQLPermission(name, actions);
473 } else if (PropertyPermission.class.getName().equals(classname)) {
474 return new PropertyPermission(name, actions);
475 } else if (LoggingPermission.class.getName().equals(classname)) {
476 return new LoggingPermission(name, actions);
477 } else if (SSLPermission.class.getName().equals(classname)) {
478 return new SSLPermission(name, actions);
479 } else if (AuthPermission.class.getName().equals(classname)) {
480 return new AuthPermission(name, actions);
481 } else if (PrivateCredentialPermission.class.getName().equals(classname)) {
482 return new PrivateCredentialPermission(name, actions);
483 } else if (DelegationPermission.class.getName().equals(classname)) {
484 return new DelegationPermission(name, actions);
485 } else if (javax.security.auth.kerberos.ServicePermission.class.getName().equals(classname)) {
486 return new javax.security.auth.kerberos.ServicePermission(name, actions);
487 } else if (AudioPermission.class.getName().equals(classname)) {
488 return new AudioPermission(name, actions);
489 } else if (AdaptPermission.class.getName().equals(classname)) {
490 return new AdaptPermission(name, actions);
491 } else if (BundlePermission.class.getName().equals(classname)) {
492 return new BundlePermission(name, actions);
493 } else if (CapabilityPermission.class.getName().equals(classname)) {
494 return new CapabilityPermission(name, actions);
495 } else if (PackagePermission.class.getName().equals(classname)) {
496 return new PackagePermission(name, actions);
497 } else if (ServicePermission.class.getName().equals(classname)) {
498 return new ServicePermission(name, actions);
Changhoon Yoone71dfa42015-12-04 21:49:25 +0900499 } else if (AdminPermission.class.getName().equals(classname)) {
500 return new AdminPermission(name, actions);
501 } else if (ConfigurationPermission.class.getName().equals(classname)) {
502 return new ConfigurationPermission(name, actions);
503 } else if (ReflectPermission.class.getName().equals(classname)) {
504 return new ReflectPermission(name, actions);
Changhoon Yoonb856b812015-08-10 03:47:19 +0900505 }
506
507 //AllPermission, SecurityPermission, UnresolvedPermission
Changhoon Yoone71dfa42015-12-04 21:49:25 +0900508 //AWTPermission, ReflectPermission not allowed
Changhoon Yoonb856b812015-08-10 03:47:19 +0900509 return null;
510
511 }
512 private static List<Permission> optimizePermissions(List<Permission> perms) {
513 Permissions permissions = listToPermissions(perms);
514 return permissionsToList(permissions);
515 }
516
517 private static List<Permission> permissionsToList(Permissions perms) {
518 List<Permission> permissions = new ArrayList<>();
519 Enumeration<Permission> e = perms.elements();
520 while (e.hasMoreElements()) {
521 permissions.add(e.nextElement());
522 }
523 return permissions;
524 }
525
526 private static Permissions listToPermissions(List<Permission> perms) {
527 Permissions permissions = new Permissions();
528 for (Permission perm : perms) {
529 permissions.add(perm);
530 }
531 return permissions;
532 }
Sho SHIMIZU94eff802016-02-22 18:07:30 -0800533}