Author: dimuthul
Date: Sat Jan 19 03:05:58 2008
New Revision: 12511

Log:

Always should check whether Admin behavior is enabled.



Modified:
   
trunk/commons/usermanager/modules/core/src/main/java/org/wso2/usermanager/acl/realm/ACLAdminChecker.java
   
trunk/commons/usermanager/modules/core/src/main/java/org/wso2/usermanager/acl/realm/ACLUserStoreAdmin.java

Modified: 
trunk/commons/usermanager/modules/core/src/main/java/org/wso2/usermanager/acl/realm/ACLAdminChecker.java
==============================================================================
--- 
trunk/commons/usermanager/modules/core/src/main/java/org/wso2/usermanager/acl/realm/ACLAdminChecker.java
    (original)
+++ 
trunk/commons/usermanager/modules/core/src/main/java/org/wso2/usermanager/acl/realm/ACLAdminChecker.java
    Sat Jan 19 03:05:58 2008
@@ -10,14 +10,14 @@
     
     private static List adminUsers = new ArrayList();
     
-    public static void loadAdminUsers(String adminRole, Realm realm) throws 
UserManagerException{
+    static void loadAdminUsers(String adminRole, Realm realm) throws 
UserManagerException{
         String[] users = realm.getUserStoreReader().getUsersInRole(adminRole);
         for(int i=0;i<users.length;i++){
             adminUsers.add(users[i]);
         }
     }
     
-    public static boolean isAdminUser(String username){
+    static boolean isAdminUser(String username){
         return adminUsers.contains(username);
     }
 }

Modified: 
trunk/commons/usermanager/modules/core/src/main/java/org/wso2/usermanager/acl/realm/ACLUserStoreAdmin.java
==============================================================================
--- 
trunk/commons/usermanager/modules/core/src/main/java/org/wso2/usermanager/acl/realm/ACLUserStoreAdmin.java
  (original)
+++ 
trunk/commons/usermanager/modules/core/src/main/java/org/wso2/usermanager/acl/realm/ACLUserStoreAdmin.java
  Sat Jan 19 03:05:58 2008
@@ -17,8 +17,8 @@
 
     private UserStoreAdmin usAdmin = null;
 
-   
-    public ACLUserStoreAdmin(Authorizer athzr, UserStoreAdmin admin, 
AuthorizingRealmConfig authConfig) {
+    public ACLUserStoreAdmin(Authorizer athzr, UserStoreAdmin admin,
+            AuthorizingRealmConfig authConfig) {
         super(athzr, admin, authConfig);
         this.authorizer = athzr;
         this.usAdmin = admin;
@@ -29,9 +29,10 @@
      */
     public void addUser(String userName, Object credential)
             throws UserManagerException {
-        if(config.isEnableAdminBehavior() && isAdmin){
-            //authorized
-        } else if 
(!authorizer.isUserAuthorized(config.getAuthenticatedUserName(),
+        if (config.isEnableAdminBehavior() && isAdmin) {
+            // authorized
+        } else if (!authorizer.isUserAuthorized(config
+                .getAuthenticatedUserName(),
                 UserManagerConstants.USER_RESOURCE, UserManagerConstants.ADD)) 
{
 
             throw new UnauthorizedException("unAuthorized", new String[] {
@@ -46,10 +47,11 @@
      */
     public void updateUser(String userName, Object newCredential,
             Object oldCredential) throws UserManagerException {
-        
-        if(config.isEnableAdminBehavior() && isAdmin){
-            //authorized
-        } else if 
(!authorizer.isUserAuthorized(config.getAuthenticatedUserName(),
+
+        if (config.isEnableAdminBehavior() && isAdmin) {
+            // authorized
+        } else if (!authorizer.isUserAuthorized(config
+                .getAuthenticatedUserName(),
                 UserManagerConstants.USER_RESOURCE, 
UserManagerConstants.EDIT)) {
 
             throw new UnauthorizedException("unAuthorized", new String[] {
@@ -61,9 +63,10 @@
 
     public void updateUser(String userName, Object newCredential)
             throws UserManagerException {
-        if(config.isEnableAdminBehavior() && isAdmin){
-            //authorized
-        } else if 
(!authorizer.isUserAuthorized(config.getAuthenticatedUserName(),
+        if (config.isEnableAdminBehavior() && isAdmin) {
+            // authorized
+        } else if (!authorizer.isUserAuthorized(config
+                .getAuthenticatedUserName(),
                 UserManagerConstants.USER_RESOURCE, 
UserManagerConstants.EDIT)) {
 
             throw new UnauthorizedException("unAuthorized", new String[] {
@@ -77,16 +80,16 @@
      * Delete user from user store
      */
     public void deleteUser(String userName) throws UserManagerException {
-        if(config.getAuthenticatedUserName().equals(userName)){
+        if (config.getAuthenticatedUserName().equals(userName)) {
             return;
-        }else if(ACLAdminChecker.isAdminUser(userName)){
+        } else if (ACLAdminChecker.isAdminUser(userName)) {
             /*
-              TODO : Is there a requirement to delete the user
-              if the caller is a Admin
-            */
+             * TODO : Is there a requirement to delete the user if the caller 
is
+             * a Admin
+             */
             return;
-        }else if(config.isEnableAdminBehavior() && isAdmin){
-            //authorized
+        } else if (config.isEnableAdminBehavior() && isAdmin) {
+            // authorized
         } else if (!authorizer
                 .isUserAuthorized(config.getAuthenticatedUserName(),
                         UserManagerConstants.USER_RESOURCE,
@@ -103,12 +106,13 @@
      */
     public void setUserProperties(String userName, Map properties)
             throws UserManagerException {
-        if(config.isEnableAdminBehavior() && isAdmin){
-            //authorized
-        } else if(config.getAuthenticatedUserName().equals(userName) &&
-                config.isCurrentUserEditable()){
-            //do nothing - authorized
-        }else if 
(!authorizer.isUserAuthorized(config.getAuthenticatedUserName(),
+        if (config.isEnableAdminBehavior() && isAdmin) {
+            // authorized
+        } else if (config.getAuthenticatedUserName().equals(userName)
+                && config.isCurrentUserEditable()) {
+            // do nothing - authorized
+        } else if (!authorizer.isUserAuthorized(config
+                .getAuthenticatedUserName(),
                 UserManagerConstants.USER_RESOURCE, 
UserManagerConstants.EDIT)) {
 
             throw new UnauthorizedException("unAuthorized", new String[] {
@@ -122,9 +126,10 @@
      * Add role to user store
      */
     public void addRole(String roleName) throws UserManagerException {
-        if(config.isEnableAdminBehavior() && isAdmin){
-            //authorized
-        } else if 
(!authorizer.isUserAuthorized(config.getAuthenticatedUserName(),
+        if (config.isEnableAdminBehavior() && isAdmin) {
+            // authorized
+        } else if (!authorizer.isUserAuthorized(config
+                .getAuthenticatedUserName(),
                 UserManagerConstants.ROLE_RESOURCE, UserManagerConstants.ADD)) 
{
 
             throw new UnauthorizedException("unAuthorized", new String[] {
@@ -138,10 +143,11 @@
      * Delete role from user store
      */
     public void deleteRole(String roleName) throws UserManagerException {
-        if(config.getAdminRoleName().equals(roleName)){
+        if (config.isEnableAdminBehavior()
+                && config.getAdminRoleName().equals(roleName)) {
             return;
-        }else if(config.isEnableAdminBehavior() && isAdmin){
-            //authorized
+        } else if (config.isEnableAdminBehavior() && isAdmin) {
+            // authorized
         } else if (!authorizer
                 .isUserAuthorized(config.getAuthenticatedUserName(),
                         UserManagerConstants.ROLE_RESOURCE,
@@ -159,11 +165,13 @@
      */
     public void setRoleProperties(String roleName, Map properties)
             throws UserManagerException {
-        if(config.getAdminRoleName().equals(roleName)){
+        if (config.isEnableAdminBehavior()
+                && config.getAdminRoleName().equals(roleName)) {
             return;
-        }else if(config.isEnableAdminBehavior() && isAdmin){
-            //authorized
-        } else if 
(!authorizer.isUserAuthorized(config.getAuthenticatedUserName(),
+        } else if (config.isEnableAdminBehavior() && isAdmin) {
+            // authorized
+        } else if (!authorizer.isUserAuthorized(config
+                .getAuthenticatedUserName(),
                 UserManagerConstants.ROLE_RESOURCE, 
UserManagerConstants.EDIT)) {
 
             throw new UnauthorizedException("unAuthorized", new String[] {
@@ -178,15 +186,17 @@
      */
     public void addUserToRole(String userName, String roleName)
             throws UserManagerException {
-        if(config.getAdminRoleName().equals(roleName)){
+        if (config.isEnableAdminBehavior()
+                && config.getAdminRoleName().equals(roleName)) {
             /*
-                TODO : is there a requirement to perform this action
-                if the caller is a Admin
-            */
-            return;
-        }else if(config.isEnableAdminBehavior() && isAdmin){
-            //authorized
-        } else if 
(!authorizer.isUserAuthorized(config.getAuthenticatedUserName(),
+             * TODO : is there a requirement to perform this action if the
+             * caller is a Admin
+             */
+            return;
+        } else if (config.isEnableAdminBehavior() && isAdmin) {
+            // authorized
+        } else if (!authorizer.isUserAuthorized(config
+                .getAuthenticatedUserName(),
                 UserManagerConstants.ROLE_RESOURCE, UserManagerConstants.ADD)) 
{
 
             throw new UnauthorizedException("unAuthorized", new String[] {
@@ -201,14 +211,15 @@
      */
     public void removeUserFromRole(String userName, String roleName)
             throws UserManagerException {
-        if(config.getAdminRoleName().equals(roleName)){
+        if (config.isEnableAdminBehavior()
+                && config.getAdminRoleName().equals(roleName)) {
             /*
-            TODO : is there a requirement to perform this action
-            if the caller is a Admin
+             * TODO : is there a requirement to perform this action if the
+             * caller is a Admin
              */
             return;
-        }else if(config.isEnableAdminBehavior() && isAdmin){
-            //authorized
+        } else if (config.isEnableAdminBehavior() && isAdmin) {
+            // authorized
         } else if (!authorizer
                 .isUserAuthorized(config.getAuthenticatedUserName(),
                         UserManagerConstants.ROLE_RESOURCE,

_______________________________________________
Commons-dev mailing list
[email protected]
http://wso2.org/cgi-bin/mailman/listinfo/commons-dev

Reply via email to