diff options
author | Abyss777 <abyss@fox5.ru> | 2017-01-13 09:26:52 +0500 |
---|---|---|
committer | Abyss777 <abyss@fox5.ru> | 2017-01-16 13:44:54 +0500 |
commit | cffbce4b3bc5ef817c4063a74f148a2a5986d58a (patch) | |
tree | 3eb18f009ec1a7ae5d806eed1a4af7b6a16840e2 /src/org/traccar/database/PermissionsManager.java | |
parent | 3533a7c9007c4ef4f761ff4d959e396b65a7b140 (diff) | |
download | trackermap-server-cffbce4b3bc5ef817c4063a74f148a2a5986d58a.tar.gz trackermap-server-cffbce4b3bc5ef817c4063a74f148a2a5986d58a.tar.bz2 trackermap-server-cffbce4b3bc5ef817c4063a74f148a2a5986d58a.zip |
Initial manager implementation
Diffstat (limited to 'src/org/traccar/database/PermissionsManager.java')
-rw-r--r-- | src/org/traccar/database/PermissionsManager.java | 134 |
1 files changed, 121 insertions, 13 deletions
diff --git a/src/org/traccar/database/PermissionsManager.java b/src/org/traccar/database/PermissionsManager.java index 6c0610655..3c62f84c2 100644 --- a/src/org/traccar/database/PermissionsManager.java +++ b/src/org/traccar/database/PermissionsManager.java @@ -1,5 +1,5 @@ /* - * Copyright 2015 - 2016 Anton Tananaev (anton@traccar.org) + * Copyright 2015 - 2017 Anton Tananaev (anton@traccar.org) * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. @@ -23,11 +23,14 @@ import org.traccar.model.Group; import org.traccar.model.GroupPermission; import org.traccar.model.Server; import org.traccar.model.User; +import org.traccar.model.UserPermission; import java.sql.SQLException; +import java.util.ArrayList; import java.util.Collection; import java.util.HashMap; import java.util.HashSet; +import java.util.Iterator; import java.util.Map; import java.util.Objects; import java.util.Set; @@ -47,6 +50,8 @@ public class PermissionsManager { private final Map<Long, Set<Long>> deviceUsers = new HashMap<>(); private final Map<Long, Set<Long>> groupDevices = new HashMap<>(); + private final Map<Long, Set<Long>> userPermissions = new HashMap<>(); + public Set<Long> getGroupPermissions(long userId) { if (!groupPermissions.containsKey(userId)) { groupPermissions.put(userId, new HashSet<Long>()); @@ -75,10 +80,18 @@ public class PermissionsManager { return groupDevices.get(groupId); } + public Set<Long> getUserPermissions(long userId) { + if (!userPermissions.containsKey(userId)) { + userPermissions.put(userId, new HashSet<Long>()); + } + return userPermissions.get(userId); + } + public PermissionsManager(DataManager dataManager) { this.dataManager = dataManager; refreshUsers(); refreshPermissions(); + refreshUserPermissions(); } public final void refreshUsers() { @@ -97,6 +110,17 @@ public class PermissionsManager { } } + public final void refreshUserPermissions() { + userPermissions.clear(); + try { + for (UserPermission permission : dataManager.getUserPermissions()) { + getUserPermissions(permission.getUserId()).add(permission.getOtherUserId()); + } + } catch (SQLException error) { + Log.warning(error); + } + } + public final void refreshPermissions() { groupPermissions.clear(); devicePermissions.clear(); @@ -146,6 +170,39 @@ public class PermissionsManager { } } + public boolean isManager(long userId) { + return users.containsKey(userId) && users.get(userId).getUserLimit() > 0; + } + + public void checkManager(long userId) throws SecurityException { + if (!isManager(userId)) { + throw new SecurityException("Manager access required"); + } + } + + public void checkManager(long userId, long otherUserId) throws SecurityException { + checkManager(userId); + if (!userPermissions.get(userId).contains(otherUserId)) { + throw new SecurityException("User access denied"); + } + } + + public void checkUserLimit(long userId) throws SecurityException { + if (!isAdmin(userId) && userPermissions.get(userId).size() >= users.get(userId).getUserLimit()) { + throw new SecurityException("Manager user limit reached"); + } + } + + public void checkDeviceLimit(long userId) throws SecurityException { + int deviceLimit = users.get(userId).getDeviceLimit(); + if (deviceLimit != 0) { + int deviceCount = getDevicePermissions(userId).size(); + if (deviceCount >= deviceLimit) { + throw new SecurityException("User device limit reached"); + } + } + } + public boolean isReadonly(long userId) { return users.containsKey(userId) && users.get(userId).getReadonly(); } @@ -168,30 +225,52 @@ public class PermissionsManager { public void checkUserUpdate(long userId, User before, User after) throws SecurityException { if (before.getAdmin() != after.getAdmin() - || before.getReadonly() != after.getReadonly() - || before.getDisabled() != after.getDisabled() || before.getDeviceLimit() != after.getDeviceLimit() + || before.getUserLimit() != after.getUserLimit()) { + checkAdmin(userId); + } + if (before.getReadonly() != after.getReadonly() + || before.getDisabled() != after.getDisabled() || !Objects.equals(before.getExpirationTime(), after.getExpirationTime()) || !Objects.equals(before.getToken(), after.getToken())) { - checkAdmin(userId); + if (userId == after.getId()) { + checkAdmin(userId); + } + if (!isAdmin(userId)) { + checkManager(userId); + } } } public void checkUser(long userId, long otherUserId) throws SecurityException { - if (userId != otherUserId) { - checkAdmin(userId); + if (userId != otherUserId && !isAdmin(userId)) { + checkManager(userId, otherUserId); } } public void checkGroup(long userId, long groupId) throws SecurityException { - if (!getGroupPermissions(userId).contains(groupId)) { - throw new SecurityException("Group access denied"); + if (!getGroupPermissions(userId).contains(groupId) && !isAdmin(userId)) { + Iterator<Long> iterator = getUserPermissions(userId).iterator(); + boolean managed = false; + while (!managed && iterator.hasNext()) { + managed = getGroupPermissions(iterator.next()).contains(groupId); + } + if (!managed) { + throw new SecurityException("Group access denied"); + } } } public void checkDevice(long userId, long deviceId) throws SecurityException { - if (!getDevicePermissions(userId).contains(deviceId)) { - throw new SecurityException("Device access denied"); + if (!getDevicePermissions(userId).contains(deviceId) && !isAdmin(userId)) { + Iterator<Long> iterator = getUserPermissions(userId).iterator(); + boolean managed = false; + while (!managed && iterator.hasNext()) { + managed = getDevicePermissions(iterator.next()).contains(deviceId); + } + if (!managed) { + throw new SecurityException("Device access denied"); + } } } @@ -203,13 +282,27 @@ public class PermissionsManager { public void checkGeofence(long userId, long geofenceId) throws SecurityException { if (!Context.getGeofenceManager().checkGeofence(userId, geofenceId) && !isAdmin(userId)) { - throw new SecurityException("Geofence access denied"); + Iterator<Long> iterator = getUserPermissions(userId).iterator(); + boolean managed = false; + while (!managed && iterator.hasNext()) { + managed = Context.getGeofenceManager().checkGeofence(iterator.next(), geofenceId); + } + if (!managed) { + throw new SecurityException("Geofence access denied"); + } } } public void checkCalendar(long userId, long calendarId) throws SecurityException { if (!Context.getCalendarManager().checkCalendar(userId, calendarId) && !isAdmin(userId)) { - throw new SecurityException("Calendar access denied"); + Iterator<Long> iterator = getUserPermissions(userId).iterator(); + boolean managed = false; + while (!managed && iterator.hasNext()) { + managed = Context.getCalendarManager().checkCalendar(iterator.next(), calendarId); + } + if (!managed) { + throw new SecurityException("Calendar access denied"); + } } } @@ -222,10 +315,24 @@ public class PermissionsManager { this.server = server; } - public Collection<User> getUsers() { + public Collection<User> getAllUsers() { return users.values(); } + public Collection<User> getUsers(long userId) { + Collection<User> result = new ArrayList<>(); + for (long otherUserId : getUserPermissions(userId)) { + result.add(users.get(otherUserId)); + } + return result; + } + + public Collection<User> getManagedUsers(long userId) { + Collection<User> result = getUsers(userId); + result.add(users.get(userId)); + return result; + } + public User getUser(long userId) { return users.get(userId); } @@ -257,6 +364,7 @@ public class PermissionsManager { usersTokens.remove(users.get(userId).getToken()); users.remove(userId); refreshPermissions(); + refreshUserPermissions(); } public User login(String email, String password) throws SQLException { |