]> git.aero2k.de Git - tmp/jakarta-migration.git/blob
c22344991e8c964cf5950266a472e6475003ed62
[tmp/jakarta-migration.git] /
1 /**
2  *  This document is a part of the source code and related artifacts
3  *  for CollectionSpace, an open source collections management system
4  *  for museums and related institutions:
5
6  *  http://www.collectionspace.org
7  *  http://wiki.collectionspace.org
8
9  *  Copyright 2009 University of California at Berkeley
10
11  *  Licensed under the Educational Community License (ECL), Version 2.0.
12  *  You may not use this file except in compliance with this License.
13
14  *  You may obtain a copy of the ECL 2.0 License at
15
16  *  https://source.collectionspace.org/collection-space/LICENSE.txt
17
18  *  Unless required by applicable law or agreed to in writing, software
19  *  distributed under the License is distributed on an "AS IS" BASIS,
20  *  WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
21  *  See the License for the specific language governing permissions and
22  *  limitations under the License.
23  */
24 package org.collectionspace.services.authorization.test;
25
26 //import java.util.ArrayList;
27 //import java.util.List;
28 import java.util.ArrayList;
29 import java.util.List;
30 import org.collectionspace.services.authorization.ActionType;
31 import org.slf4j.Logger;
32 import org.slf4j.LoggerFactory;
33 //import org.collectionspace.services.client.test.BaseServiceTest;
34 import org.collectionspace.services.authorization.AuthZ;
35 import org.collectionspace.services.authorization.CSpaceAction;
36 import org.collectionspace.services.authorization.Permission;
37 import org.collectionspace.services.authorization.PermissionAction;
38 import org.collectionspace.services.authorization.PermissionException;
39 import org.collectionspace.services.authorization.PermissionRole;
40 import org.collectionspace.services.authorization.PermissionsList;
41 import org.collectionspace.services.authorization.PermissionsRolesList;
42 import org.collectionspace.services.authorization.RoleValue;
43 import org.collectionspace.services.authorization.URIResourceImpl;
44 import org.springframework.transaction.TransactionStatus;
45 import org.testng.annotations.BeforeClass;
46
47 /**
48  *
49  * @author 
50  */
51 public class AuthorizationSeedTest extends AbstractAuthorizationTestImpl {
52
53     final Logger logger = LoggerFactory.getLogger(AuthorizationSeedTest.class);
54     final static String PERMISSION_FILE = "test-permissions.xml";
55     final static String PERMISSION_ROLE_FILE = "test-permissions-roles.xml";
56
57     @BeforeClass(alwaysRun = true)
58     public void seedData() {
59         setup();
60         TransactionStatus status = beginTransaction("seedData");
61         try {
62             AuthorizationGen authzGen = new AuthorizationGen();
63             PermissionsList pl = authzGen.genPermissions();
64             authzGen.writePermissions(pl, PERMISSION_FILE);
65             PermissionsRolesList prl = authzGen.genPermissionsRoles(pl);
66             authzGen.writePermissionRoles(prl, PERMISSION_ROLE_FILE);
67             seedRoles();
68             seedPermissions();
69         } catch (Exception ex) {
70             rollbackTransaction(status);
71             ex.printStackTrace();
72             throw new RuntimeException(ex);
73         }
74         commitTransaction(status);
75     }
76
77     public void seedRoles() throws Exception {
78         //Should this test really be empty?
79     }
80
81     public void seedPermissions() throws Exception {
82         PermissionsList pcList =
83                 (PermissionsList) fromFile(PermissionsList.class, baseDir
84                 + AbstractAuthorizationTestImpl.testDataDir + PERMISSION_FILE);
85         logger.info("read permissions from "
86                 + baseDir + AbstractAuthorizationTestImpl.testDataDir +  PERMISSION_FILE);
87         PermissionsRolesList pcrList =
88                 (PermissionsRolesList) fromFile(PermissionsRolesList.class, baseDir
89                 + AbstractAuthorizationTestImpl.testDataDir + PERMISSION_ROLE_FILE);
90         logger.info("read permissions-roles from "
91                 + baseDir + AbstractAuthorizationTestImpl.testDataDir +  PERMISSION_ROLE_FILE);
92         AuthZ authZ = AuthZ.get();
93         for (Permission p : pcList.getPermissions()) {
94             if (logger.isDebugEnabled()) {
95                 logger.debug("adding permission for res=" + p.getResourceName());
96             }
97             for (PermissionRole pr : pcrList.getPermissionRoles()) {
98                 if (pr.getPermissions().get(0).getPermissionId().equals(p.getCsid())) {
99                     addPermissionsForUri(p, pr);
100                 }
101             }
102         }
103     }
104
105     /**
106      * addPermissionsForUri add permissions from given permission configuration
107      * with assumption that resource is of type URI
108      * @param permission configuration
109      */
110     //FIXME this method should be in the restful web service resource of authz
111     private void addPermissionsForUri(Permission perm,
112             PermissionRole permRole) throws PermissionException {
113         List<String> principals = new ArrayList<String>();
114         if (!perm.getCsid().equals(permRole.getPermissions().get(0).getPermissionId())) {
115             throw new IllegalArgumentException("permission ids do not"
116                     + " match for role=" + permRole.getRoles().get(0).getRoleName()
117                     + " with permissionId=" + permRole.getPermissions().get(0).getPermissionId()
118                     + " for permission with csid=" + perm.getCsid());
119         }
120         for (RoleValue roleValue : permRole.getRoles()) {
121             principals.add(roleValue.getRoleName());
122         }
123         List<PermissionAction> permActions = perm.getActions();
124         for (PermissionAction permAction : permActions) {
125             CSpaceAction action = getAction(permAction.getName());
126             URIResourceImpl uriRes = new URIResourceImpl(perm.getTenantId(),
127                     perm.getResourceName(), action);
128             AuthZ.get().addPermissions(uriRes, principals.toArray(new String[0]));
129         }
130     }
131
132     /**
133      * getAction is a convenience method to get corresponding action for
134      * given ActionType
135      * @param action
136      * @return
137      */
138     private CSpaceAction getAction(ActionType action) {
139         if (ActionType.CREATE.equals(action)) {
140             return CSpaceAction.CREATE;
141         } else if (ActionType.READ.equals(action)) {
142             return CSpaceAction.READ;
143         } else if (ActionType.UPDATE.equals(action)) {
144             return CSpaceAction.UPDATE;
145         } else if (ActionType.DELETE.equals(action)) {
146             return CSpaceAction.DELETE;
147         } else if (ActionType.SEARCH.equals(action)) {
148             return CSpaceAction.SEARCH;
149         } else if (ActionType.ADMIN.equals(action)) {
150             return CSpaceAction.ADMIN;
151         } else if (ActionType.START.equals(action)) {
152             return CSpaceAction.START;
153         } else if (ActionType.STOP.equals(action)) {
154             return CSpaceAction.STOP;
155         }
156         throw new IllegalArgumentException("action = " + action.toString());
157     }
158 }