2 * This document is a part of the source code and related artifacts
3 * for CollectionSpace, an open source collections management system
4 * for museums and related institutions:
6 * http://www.collectionspace.org
7 * http://wiki.collectionspace.org
9 * Copyright 2009 University of California at Berkeley
11 * Licensed under the Educational Community License (ECL), Version 2.0.
12 * You may not use this file except in compliance with this License.
14 * You may obtain a copy of the ECL 2.0 License at
16 * https://source.collectionspace.org/collection-space/LICENSE.txt
18 * Unless required by applicable law or agreed to in writing, software
19 * distributed under the License is distributed on an "AS IS" BASIS,
20 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
21 * See the License for the specific language governing permissions and
22 * limitations under the License.
24 package org.collectionspace.services.authorization.driver;
27 import java.util.ArrayList;
28 import java.util.HashSet;
29 import java.util.List;
30 import org.collectionspace.services.authorization.AuthZ;
31 import org.collectionspace.services.authorization.perms.Permission;
32 import org.collectionspace.services.authorization.PermissionRole;
33 import org.collectionspace.services.authorization.PermissionRoleRel;
34 import org.collectionspace.services.authorization.Role;
35 import org.collectionspace.services.authorization.SubjectType;
36 import org.collectionspace.services.authorization.importer.AuthorizationGen;
37 import org.collectionspace.services.authorization.importer.AuthorizationSeed;
38 import org.collectionspace.services.authorization.importer.AuthorizationStore;
39 import org.collectionspace.services.authorization.storage.PermissionRoleUtil;
40 import org.hibernate.exception.ConstraintViolationException;
41 import org.slf4j.Logger;
42 import org.slf4j.LoggerFactory;
43 import org.springframework.context.support.ClassPathXmlApplicationContext;
44 import org.springframework.security.authentication.UsernamePasswordAuthenticationToken;
45 import org.springframework.security.core.Authentication;
46 import org.springframework.security.core.GrantedAuthority;
47 import org.springframework.security.core.authority.GrantedAuthorityImpl;
48 import org.springframework.security.core.context.SecurityContextHolder;
49 import org.springframework.transaction.TransactionDefinition;
50 import org.springframework.transaction.TransactionStatus;
51 import org.springframework.transaction.support.DefaultTransactionDefinition;
54 * A driver for seeding authorization
57 public class AuthorizationSeedDriver {
59 final Logger logger = LoggerFactory.getLogger(AuthorizationSeedDriver.class);
60 final static private String SPRING_SECURITY_METADATA = "applicationContext-authorization-test.xml";
61 final static private String ROLE_FILE = "import-roles.xml";
62 final static private String PERMISSION_FILE = "import-permissions.xml";
63 final static private String PERMISSION_ROLE_FILE = "import-permissions-roles.xml";
65 private String password;
66 private String tenantBindingFile;
67 private String exportDir;
68 private AuthorizationGen authzGen;
69 private org.springframework.jdbc.datasource.DataSourceTransactionManager txManager;
72 * AuthorizationSeedDriver
73 * @param user to use to establish security context. should be in ROLE_ADMINISTRATOR
75 * @param tenantBindingFile
76 * @param importDir dir to import permisison/permission role file from. same as
77 * export dir by default
78 * @param exportDir dir to export permission/permission role file to
80 public AuthorizationSeedDriver(String user, String password,
81 String tenantBindingFile,
83 if (user == null || user.isEmpty()) {
84 throw new IllegalArgumentException("username required.");
88 if (password == null || password.isEmpty()) {
89 throw new IllegalArgumentException("password required.");
91 this.password = password;
93 if (tenantBindingFile == null || tenantBindingFile.isEmpty()) {
94 throw new IllegalArgumentException("tenantbinding file are required.");
96 this.tenantBindingFile = tenantBindingFile;
97 if (exportDir == null || exportDir.isEmpty()) {
98 throw new IllegalArgumentException("exportdir required.");
100 this.exportDir = exportDir;
104 public void generate() {
106 authzGen = new AuthorizationGen();
107 authzGen.initialize(tenantBindingFile);
108 authzGen.createDefaultRoles();
109 authzGen.createDefaultPermissions();
110 authzGen.associateDefaultPermissionsRoles();
111 authzGen.exportDefaultRoles(exportDir + File.separator + ROLE_FILE);
112 authzGen.exportDefaultPermissions(exportDir + File.separator + PERMISSION_FILE);
113 authzGen.exportDefaultPermissionRoles(exportDir + File.separator + PERMISSION_ROLE_FILE);
114 if (logger.isDebugEnabled()) {
115 logger.debug("Authorization generation completed but not yet persisted.");
117 } catch (Exception ex) {
118 logger.error("AuthorizationSeedDriver caught an exception: ", ex);
119 throw new RuntimeException(ex);
124 TransactionStatus status = null;
126 // Push all the authz info into the cspace DB tables.
130 status = beginTransaction("seedData");
131 AuthorizationSeed authzSeed = new AuthorizationSeed();
132 authzSeed.seedPermissions(authzGen.getDefaultPermissions(), authzGen.getDefaultPermissionRoles());
133 // authzSeed.seedPermissions(exportDir + File.separator + PERMISSION_FILE,
134 // exportDir + File.separator + PERMISSION_ROLE_FILE);
135 if (logger.isDebugEnabled()) {
136 logger.debug("authorization seeding completed ");
138 } catch (Exception ex) {
139 if (status != null) {
140 rollbackTransaction(status);
142 if (logger.isDebugEnabled()) {
143 ex.printStackTrace();
145 throw new RuntimeException(ex);
147 if (status != null) {
148 commitTransaction(status);
154 private void setupSpring() {
156 ClassPathXmlApplicationContext appContext = new ClassPathXmlApplicationContext(
157 new String[]{SPRING_SECURITY_METADATA});
159 System.setProperty("spring-beans-config", SPRING_SECURITY_METADATA);
160 // authZ local not used but call to AuthZ.get() has side-effect of initializing our Spring Security context
161 AuthZ authZ = AuthZ.get();
162 txManager = (org.springframework.jdbc.datasource.DataSourceTransactionManager) appContext.getBean("transactionManager");
163 if (logger.isDebugEnabled()) {
164 logger.debug("Spring Security setup complete.");
168 private void login() {
169 //GrantedAuthority cspace_admin = new GrantedAuthorityImpl("ROLE_ADMINISTRATOR");
170 GrantedAuthority spring_security_admin = new GrantedAuthorityImpl("ROLE_SPRING_ADMIN");
171 HashSet<GrantedAuthority> gauths = new HashSet<GrantedAuthority>();
172 //gauths.add(cspace_admin);
173 gauths.add(spring_security_admin);
174 Authentication authRequest = new UsernamePasswordAuthenticationToken(user, password, gauths);
175 SecurityContextHolder.getContext().setAuthentication(authRequest);
176 if (logger.isDebugEnabled()) {
177 logger.debug("Spring Security login successful for user=" + user);
181 private void logout() {
182 SecurityContextHolder.getContext().setAuthentication(null);
183 if (logger.isDebugEnabled()) {
184 logger.debug("Spring Security logged out user=" + user);
188 private void store() throws Exception {
189 AuthorizationStore authzStore = new AuthorizationStore();
190 for (Role role : authzGen.getDefaultRoles()) {
192 authzStore.store(role);
193 } catch (Exception e) {
195 // If the role already exists, read it in and replace the instance
196 // we're trying to import with the exist one. This will ensure that the rest
197 // of import uses the correct CSID.
198 if (e.getCause() instanceof ConstraintViolationException) {
199 Role existingRole = authzStore.getRoleByName(role.getRoleName(), role.getTenantId());
206 for (Permission perm : authzGen.getDefaultPermissions()) {
207 authzStore.store(perm);
210 List<PermissionRoleRel> permRoleRels = new ArrayList<PermissionRoleRel>();
211 for (PermissionRole pr : authzGen.getDefaultPermissionRoles()) {
212 PermissionRoleUtil.buildPermissionRoleRel(pr, SubjectType.ROLE, permRoleRels, false /*not for delete*/);
214 for (PermissionRoleRel permRoleRel : permRoleRels) {
215 authzStore.store(permRoleRel);
218 if (logger.isInfoEnabled()) {
219 logger.info("Authroization metata persisted.");
223 private TransactionStatus beginTransaction(String name) {
224 DefaultTransactionDefinition def = new DefaultTransactionDefinition();
225 // explicitly setting the transaction name is something that can only be done programmatically
227 def.setPropagationBehavior(TransactionDefinition.PROPAGATION_REQUIRED);
228 return txManager.getTransaction(def);
231 private void rollbackTransaction(TransactionStatus status) {
232 txManager.rollback(status);
235 private void commitTransaction(TransactionStatus status) {
236 txManager.commit(status);