2 * This document is a part of the source code and related artifacts
3 * for CollectionSpace, an open source collections management system
4 * for museums and related institutions:
6 * http://www.collectionspace.org
7 * http://wiki.collectionspace.org
9 * Copyright 2010 University of California at Berkeley
11 * Licensed under the Educational Community License (ECL), Version 2.0.
12 * You may not use this file except in compliance with this License.
14 * You may obtain a copy of the ECL 2.0 License at
16 * https://source.collectionspace.org/collection-space/LICENSE.txt
18 * Unless required by applicable law or agreed to in writing, software
19 * distributed under the License is distributed on an "AS IS" BASIS,
20 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
21 * See the License for the specific language governing permissions and
22 * limitations under the License.
24 package org.collectionspace.services.authorization.storage;
26 import java.util.ArrayList;
27 import java.util.List;
28 import org.collectionspace.services.authorization.ActionType;
29 import org.collectionspace.services.authorization.AuthZ;
30 import org.collectionspace.services.authorization.CSpaceAction;
31 import org.collectionspace.services.authorization.CSpaceResource;
32 import org.collectionspace.services.authorization.EffectType;
33 import org.collectionspace.services.authorization.Permission;
34 import org.collectionspace.services.authorization.PermissionAction;
35 import org.collectionspace.services.authorization.PermissionException;
36 import org.collectionspace.services.authorization.PermissionRole;
37 import org.collectionspace.services.authorization.PermissionValue;
38 import org.collectionspace.services.authorization.Role;
39 import org.collectionspace.services.authorization.RoleValue;
40 import org.collectionspace.services.authorization.SubjectType;
41 import org.collectionspace.services.authorization.URIResourceImpl;
42 import org.collectionspace.services.common.context.ServiceContext;
43 import org.collectionspace.services.common.document.DocumentNotFoundException;
44 import org.collectionspace.services.common.storage.jpa.JpaStorageUtils;
45 import org.slf4j.Logger;
46 import org.slf4j.LoggerFactory;
49 * AuthorizationDelegate delegates permissions management to the underlying authorization
50 * service from the RESTful service layer. The authorization service for example
51 * might manage permissions with the help of a provider (e.g. Spring Security ACL)
54 public class AuthorizationDelegate {
56 private static final Logger logger = LoggerFactory.getLogger(AuthorizationDelegate.class);
59 * addPermissions add permissions represented given PermissionRole
61 * @param pr permission role
65 static void addPermissions(ServiceContext ctx, PermissionRole pr) throws Exception {
66 SubjectType subject = PermissionRoleUtil.getRelationSubject(ctx, pr);
67 AuthZ authz = AuthZ.get();
68 if (subject.equals(SubjectType.ROLE)) {
69 PermissionValue pv = pr.getPermissions().get(0);
70 Permission p = getPermission(pv.getPermissionId());
72 String msg = "addPermissions: No permission found for id=" + pv.getPermissionId();
74 throw new DocumentNotFoundException(msg);
76 CSpaceResource[] resources = getResources(p);
77 String[] roles = getRoles(pr.getRoles());
78 for (CSpaceResource res : resources) {
79 boolean grant = p.getEffect().equals(EffectType.PERMIT) ? true : false;
80 authz.addPermissions(res, roles, grant);
82 } else if (SubjectType.PERMISSION.equals(subject)) {
83 RoleValue rv = pr.getRoles().get(0);
84 Role r = getRole(rv.getRoleId());
86 String msg = "addPermissions: No role found for id=" + rv.getRoleId();
88 throw new DocumentNotFoundException(msg);
90 String[] roles = {rv.getRoleName()};
91 for (PermissionValue pv : pr.getPermissions()) {
92 Permission p = getPermission(pv.getPermissionId());
94 String msg = "addPermissions: No permission found for id=" + pv.getPermissionId();
96 //TODO: would be nice contiue to still send 400 back
99 CSpaceResource[] resources = getResources(p);
100 for (CSpaceResource res : resources) {
101 boolean grant = p.getEffect().equals(EffectType.PERMIT) ? true : false;
102 authz.addPermissions(res, roles, grant);
109 * deletePermissions delete all permissions associated with given permission role
111 * @param pr permissionrole
114 static void deletePermissions(ServiceContext ctx, PermissionRole pr)
116 SubjectType subject = PermissionRoleUtil.getRelationSubject(ctx, pr);
117 AuthZ authz = AuthZ.get();
118 if (subject.equals(SubjectType.ROLE)) {
119 PermissionValue pv = pr.getPermissions().get(0);
120 Permission p = getPermission(pv.getPermissionId());
122 String msg = "deletePermissions: No permission found for id=" + pv.getPermissionId();
124 throw new DocumentNotFoundException(msg);
126 CSpaceResource[] resources = getResources(p);
127 String[] roles = getRoles(pr.getRoles());
128 for (CSpaceResource res : resources) {
129 authz.deletePermissions(res, roles);
131 } else if (SubjectType.PERMISSION.equals(subject)) {
132 RoleValue rv = pr.getRoles().get(0);
133 Role r = getRole(rv.getRoleId());
135 String msg = "deletePermissions: No role found for id=" + rv.getRoleId();
137 throw new DocumentNotFoundException(msg);
139 String[] roles = {rv.getRoleName()};
140 for (PermissionValue pv : pr.getPermissions()) {
141 Permission p = getPermission(pv.getPermissionId());
143 String msg = "deletePermissions: No permission found for id=" + pv.getPermissionId();
145 //TODO: would be nice contiue to still send 400 back
148 CSpaceResource[] resources = getResources(p);
149 for (CSpaceResource res : resources) {
150 authz.deletePermissions(res, roles);
157 * deletePermissions delete permissions associated with given permission id
161 //Non-javadoc comment : this is a very dangerous operation as it deletes
162 //the Spring ACL instead of ACE(s) that is associated with each role
163 //the ACL might be needed for other ACEs (including those for ROLE_ADMINISTRATOR,
164 //ROLE_TENANT_ADMINISTRATOR, etc.)...
165 static public void deletePermissions(String permCsid) throws Exception {
166 Permission p = getPermission(permCsid);
168 String msg = "deletePermissions: No permission found for id=" + permCsid;
170 throw new DocumentNotFoundException(msg);
172 CSpaceResource[] resources = getResources(p);
173 AuthZ authz = AuthZ.get();
175 for (CSpaceResource res : resources) {
177 authz.deletePermissions(res);
178 } catch (PermissionException pe) {
179 //perms are created downthere only if roles are related to the permissions
180 logger.info("no permissions found in authz service provider for "
181 + "permCsid=" + permCsid + " res=" + res.getId());
187 * getRoles get roles (string) array from given RoleValue list
188 * @param rvl rolevalue list
189 * @return string array with role names
192 private static String[] getRoles(List<RoleValue> rvl)
193 throws DocumentNotFoundException {
194 List<String> rvls = new ArrayList<String>();
195 for (RoleValue rv : rvl) {
196 Role r = getRole(rv.getRoleId());
198 String msg = "getRoles: No role found for id=" + rv.getRoleId();
200 //TODO: would be nice contiue to still send 400 back
203 rvls.add(r.getRoleName());
205 return rvls.toArray(new String[0]);
209 * getResources from given PermissionValue
210 * @param permisison csid
211 * @return array of CSpaceResource
212 * @see PermissionValue
213 * @see CSpaceResource
215 private static CSpaceResource[] getResources(Permission p) {
216 List<CSpaceResource> rl = new ArrayList<CSpaceResource>();
218 for (PermissionAction pa : p.getActions()) {
219 CSpaceResource res = null;
220 if (p.getTenantId() == null) {
221 res = new URIResourceImpl(p.getResourceName(),
222 getAction(pa.getName()));
224 res = new URIResourceImpl(p.getTenantId(), p.getResourceName(),
225 getAction(pa.getName()));
229 return rl.toArray(new CSpaceResource[0]);
232 private static Permission getPermission(String permCsid)
233 throws DocumentNotFoundException {
234 Permission p = (Permission) JpaStorageUtils.getEntity(permCsid,
239 private static Role getRole(String roleCsid)
240 throws DocumentNotFoundException {
241 Role r = (Role) JpaStorageUtils.getEntity(roleCsid,
247 * getAction is a convenience method to get corresponding action for
252 public static CSpaceAction getAction(ActionType action) {
253 if (ActionType.CREATE.equals(action)) {
254 return CSpaceAction.CREATE;
255 } else if (ActionType.READ.equals(action)) {
256 return CSpaceAction.READ;
257 } else if (ActionType.UPDATE.equals(action)) {
258 return CSpaceAction.UPDATE;
259 } else if (ActionType.DELETE.equals(action)) {
260 return CSpaceAction.DELETE;
261 } else if (ActionType.SEARCH.equals(action)) {
262 return CSpaceAction.SEARCH;
263 } else if (ActionType.ADMIN.equals(action)) {
264 return CSpaceAction.ADMIN;
265 } else if (ActionType.START.equals(action)) {
266 return CSpaceAction.START;
267 } else if (ActionType.STOP.equals(action)) {
268 return CSpaceAction.STOP;
270 throw new IllegalArgumentException("action = " + action.toString());