1 package org.apache.archiva.security;
4 * Licensed to the Apache Software Foundation (ASF) under one
5 * or more contributor license agreements. See the NOTICE file
6 * distributed with this work for additional information
7 * regarding copyright ownership. The ASF licenses this file
8 * to you under the Apache License, Version 2.0 (the
9 * "License"); you may not use this file except in compliance
10 * with the License. You may obtain a copy of the License at
12 * http://www.apache.org/licenses/LICENSE-2.0
14 * Unless required by applicable law or agreed to in writing,
15 * software distributed under the License is distributed on an
16 * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
17 * KIND, either express or implied. See the License for the
18 * specific language governing permissions and limitations
22 import java.util.List;
24 import org.codehaus.plexus.redback.rbac.RBACManager;
25 import org.codehaus.plexus.redback.system.check.EnvironmentCheck;
26 import org.slf4j.Logger;
27 import org.slf4j.LoggerFactory;
28 import org.springframework.stereotype.Service;
30 import javax.inject.Inject;
31 import javax.inject.Named;
34 * ArchivaStandardRolesCheck tests for the existance of expected / standard roles and permissions.
38 * plexus.component role="org.codehaus.plexus.redback.system.check.EnvironmentCheck"
39 * role-hint="required-roles"
41 @Service("environmentCheck#archiva-required-roles")
42 public class ArchivaStandardRolesCheck
43 implements EnvironmentCheck
45 private Logger log = LoggerFactory.getLogger( ArchivaStandardRolesCheck.class );
48 * plexus.requirement role-hint="cached"
50 @Inject @Named(value = "rBACManager#cached")
51 private RBACManager rbacManager;
54 * boolean detailing if this environment check has been executed
56 private boolean checked = false;
58 public void validateEnvironment( List<String> violations )
62 String expectedRoles[] = new String[] {
63 ArchivaRoleConstants.SYSTEM_ADMINISTRATOR_ROLE,
64 ArchivaRoleConstants.GLOBAL_REPOSITORY_MANAGER_ROLE,
65 ArchivaRoleConstants.GLOBAL_REPOSITORY_OBSERVER_ROLE,
66 ArchivaRoleConstants.GUEST_ROLE,
67 ArchivaRoleConstants.REGISTERED_USER_ROLE,
68 ArchivaRoleConstants.USER_ADMINISTRATOR_ROLE };
70 log.info( "Checking the existance of required roles." );
72 for ( String roleName : expectedRoles )
74 if ( !rbacManager.roleExists( roleName ) )
76 violations.add( "Unable to validate the existances of the '" + roleName + "' role." );
80 String expectedOperations[] = new String[] {
81 ArchivaRoleConstants.OPERATION_MANAGE_USERS,
82 ArchivaRoleConstants.OPERATION_MANAGE_CONFIGURATION,
83 ArchivaRoleConstants.OPERATION_REGENERATE_INDEX,
84 ArchivaRoleConstants.OPERATION_RUN_INDEXER,
85 ArchivaRoleConstants.OPERATION_ACCESS_REPORT,
86 ArchivaRoleConstants.OPERATION_ADD_REPOSITORY,
87 ArchivaRoleConstants.OPERATION_DELETE_REPOSITORY,
88 ArchivaRoleConstants.OPERATION_REPOSITORY_ACCESS,
89 ArchivaRoleConstants.OPERATION_EDIT_REPOSITORY,
90 ArchivaRoleConstants.OPERATION_REPOSITORY_UPLOAD,
91 ArchivaRoleConstants.OPERATION_REPOSITORY_ACCESS,
94 log.info( "Checking the existance of required operations." );
96 for ( String operation : expectedOperations )
98 if ( !rbacManager.operationExists( operation ) )
100 violations.add( "Unable to validate the existances of the '" + operation + "' operation." );