]> git.aero2k.de Git - tmp/jakarta-migration.git/blob
292ad614baf79efd19c97469cf06df8da71eb655
[tmp/jakarta-migration.git] /
1 /**
2  *  This document is a part of the source code and related artifacts
3  *  for CollectionSpace, an open source collections management system
4  *  for museums and related institutions:
5
6  *  http://www.collectionspace.org
7  *  http://wiki.collectionspace.org
8
9  *  Copyright 2009 University of California at Berkeley
10
11  *  Licensed under the Educational Community License (ECL), Version 2.0.
12  *  You may not use this file except in compliance with this License.
13
14  *  You may obtain a copy of the ECL 2.0 License at
15
16  *  https://source.collectionspace.org/collection-space/LICENSE.txt
17
18  *  Unless required by applicable law or agreed to in writing, software
19  *  distributed under the License is distributed on an "AS IS" BASIS,
20  *  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
21  *  See the License for the specific language governing permissions and
22  *  limitations under the License.
23  */
24 package org.collectionspace.services.authorization.importer;
25
26 //import java.util.ArrayList;
27 //import java.util.List;
28 import java.io.File;
29 import org.collectionspace.services.authorization.generator.AuthorizationGen;
30 import java.util.ArrayList;
31 import java.util.List;
32 import org.collectionspace.services.authorization.ActionType;
33 import org.slf4j.Logger;
34 import org.slf4j.LoggerFactory;
35 //import org.collectionspace.services.client.test.BaseServiceTest;
36 import org.collectionspace.services.authorization.AuthZ;
37 import org.collectionspace.services.authorization.CSpaceAction;
38 import org.collectionspace.services.authorization.Permission;
39 import org.collectionspace.services.authorization.PermissionAction;
40 import org.collectionspace.services.authorization.PermissionException;
41 import org.collectionspace.services.authorization.PermissionRole;
42 import org.collectionspace.services.authorization.PermissionsList;
43 import org.collectionspace.services.authorization.PermissionsRolesList;
44 import org.collectionspace.services.authorization.RoleValue;
45 import org.collectionspace.services.authorization.URIResourceImpl;
46 import org.springframework.transaction.TransactionStatus;
47 import org.testng.annotations.BeforeClass;
48
49 /**
50  *
51  * @author 
52  */
53 public class AuthorizationSeedTest extends AbstractAuthorizationTestImpl {
54
55     final Logger logger = LoggerFactory.getLogger(AuthorizationSeedTest.class);
56     final static String PERMISSION_FILE = "import-permissions.xml";
57     final static String PERMISSION_ROLE_FILE = "import-permissions-roles.xml";
58
59     @BeforeClass(alwaysRun = true)
60     public void seedData() {
61         setup();
62         TransactionStatus status = beginTransaction("seedData");
63         try {
64             AuthorizationGen authzGen = new AuthorizationGen();
65             String tenantBindingFile = getTenantBindingFile();
66             authzGen.initialize(tenantBindingFile);
67             authzGen.createDefaultServicePermissions();
68             authzGen.createDefaultPermissionsRoles("ROLE_ADMINISTRATOR");
69             String exportDir = getExportDir();
70             authzGen.exportPermissions(exportDir + PERMISSION_FILE);
71             authzGen.exportPermissionRoles(exportDir + PERMISSION_ROLE_FILE);
72             seedRoles();
73             seedPermissions();
74         } catch (Exception ex) {
75             rollbackTransaction(status);
76             ex.printStackTrace();
77             throw new RuntimeException(ex);
78         }
79         commitTransaction(status);
80     }
81
82     public void seedRoles() throws Exception {
83         //Should this test really be empty?
84     }
85
86     public void seedPermissions() throws Exception {
87         String importDir = getImportDir();
88         PermissionsList pcList =
89                 (PermissionsList) fromFile(PermissionsList.class,
90                 importDir + PERMISSION_FILE);
91         logger.info("read permissions from "
92                 + importDir + PERMISSION_FILE);
93         PermissionsRolesList pcrList =
94                 (PermissionsRolesList) fromFile(PermissionsRolesList.class,
95                 importDir + PERMISSION_ROLE_FILE);
96         logger.info("read permissions-roles from "
97                 + importDir + PERMISSION_ROLE_FILE);
98         AuthZ authZ = AuthZ.get();
99         for (Permission p : pcList.getPermissions()) {
100             if (logger.isDebugEnabled()) {
101                 logger.debug("adding permission for res=" + p.getResourceName());
102             }
103             for (PermissionRole pr : pcrList.getPermissionRoles()) {
104                 if (pr.getPermissions().get(0).getPermissionId().equals(p.getCsid())) {
105                     addPermissionsForUri(p, pr);
106                 }
107             }
108         }
109     }
110
111     /**
112      * addPermissionsForUri add permissions from given permission configuration
113      * with assumption that resource is of type URI
114      * @param permission configuration
115      */
116     //FIXME this method should be in the restful web service resource of authz
117     private void addPermissionsForUri(Permission perm,
118             PermissionRole permRole) throws PermissionException {
119         List<String> principals = new ArrayList<String>();
120         if (!perm.getCsid().equals(permRole.getPermissions().get(0).getPermissionId())) {
121             throw new IllegalArgumentException("permission ids do not"
122                     + " match for role=" + permRole.getRoles().get(0).getRoleName()
123                     + " with permissionId=" + permRole.getPermissions().get(0).getPermissionId()
124                     + " for permission with csid=" + perm.getCsid());
125         }
126         for (RoleValue roleValue : permRole.getRoles()) {
127             principals.add(roleValue.getRoleName());
128         }
129         List<PermissionAction> permActions = perm.getActions();
130         for (PermissionAction permAction : permActions) {
131             CSpaceAction action = getAction(permAction.getName());
132             URIResourceImpl uriRes = new URIResourceImpl(perm.getTenantId(),
133                     perm.getResourceName(), action);
134             AuthZ.get().addPermissions(uriRes, principals.toArray(new String[0]));
135         }
136     }
137
138     /**
139      * getAction is a convenience method to get corresponding action for
140      * given ActionType
141      * @param action
142      * @return
143      */
144     private CSpaceAction getAction(ActionType action) {
145         if (ActionType.CREATE.equals(action)) {
146             return CSpaceAction.CREATE;
147         } else if (ActionType.READ.equals(action)) {
148             return CSpaceAction.READ;
149         } else if (ActionType.UPDATE.equals(action)) {
150             return CSpaceAction.UPDATE;
151         } else if (ActionType.DELETE.equals(action)) {
152             return CSpaceAction.DELETE;
153         } else if (ActionType.SEARCH.equals(action)) {
154             return CSpaceAction.SEARCH;
155         } else if (ActionType.ADMIN.equals(action)) {
156             return CSpaceAction.ADMIN;
157         } else if (ActionType.START.equals(action)) {
158             return CSpaceAction.START;
159         } else if (ActionType.STOP.equals(action)) {
160             return CSpaceAction.STOP;
161         }
162         throw new IllegalArgumentException("action = " + action.toString());
163     }
164
165     private String getTenantBindingFile() {
166         String tenantBindingFile = System.getProperty("tenantbindings");
167         if (tenantBindingFile == null || tenantBindingFile.isEmpty()) {
168             throw new IllegalStateException("tenantbindings are required."
169                     + " System property tenantbindings is missing or empty");
170         }
171         return tenantBindingFile;
172     }
173
174     private String getImportDir() {
175         String importDir = System.getProperty("importdir");
176         if (importDir == null || importDir.isEmpty()) {
177             throw new IllegalStateException("importdir required."
178                     + " System property importdir is missing or empty");
179         }
180         return importDir + File.separator;
181     }
182
183     private String getExportDir() {
184         String exportDir = System.getProperty("exportdir");
185         if (exportDir == null || exportDir.isEmpty()) {
186             throw new IllegalStateException("exportdir required."
187                     + " System property exportdir is missing or empty");
188         }
189         return exportDir + File.separator;
190     }
191 }