2 * This document is a part of the source code and related artifacts
3 * for CollectionSpace, an open source collections management system
4 * for museums and related institutions:
6 * http://www.collectionspace.org
7 * http://wiki.collectionspace.org
9 * Copyright 2009 University of California at Berkeley
11 * Licensed under the Educational Community License (ECL), Version 2.0.
12 * You may not use this file except in compliance with this License.
14 * You may obtain a copy of the ECL 2.0 License at
16 * https://source.collectionspace.org/collection-space/LICENSE.txt
18 * Unless required by applicable law or agreed to in writing, software
19 * distributed under the License is distributed on an "AS IS" BASIS,
20 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
21 * See the License for the specific language governing permissions and
22 * limitations under the License.
24 package org.collectionspace.services.authorization.test;
26 //import java.util.ArrayList;
27 //import java.util.List;
28 import java.util.ArrayList;
29 import java.util.List;
30 import org.collectionspace.services.authorization.ActionType;
31 import org.slf4j.Logger;
32 import org.slf4j.LoggerFactory;
33 //import org.collectionspace.services.client.test.BaseServiceTest;
34 import org.collectionspace.services.authorization.AuthZ;
35 import org.collectionspace.services.authorization.CSpaceAction;
36 import org.collectionspace.services.authorization.Permission;
37 import org.collectionspace.services.authorization.PermissionAction;
38 import org.collectionspace.services.authorization.PermissionException;
39 import org.collectionspace.services.authorization.PermissionRole;
40 import org.collectionspace.services.authorization.PermissionsList;
41 import org.collectionspace.services.authorization.PermissionsRolesList;
42 import org.collectionspace.services.authorization.RoleValue;
43 import org.collectionspace.services.authorization.URIResourceImpl;
44 import org.springframework.transaction.TransactionStatus;
45 import org.testng.annotations.BeforeClass;
51 public class AuthorizationSeedTest extends AbstractAuthorizationTestImpl {
53 final Logger logger = LoggerFactory.getLogger(AuthorizationSeedTest.class);
54 final static String PERMISSION_FILE = "test-permissions.xml";
55 final static String PERMISSION_ROLE_FILE = "test-permissions-roles.xml";
57 @BeforeClass(alwaysRun = true)
58 public void seedData() {
60 TransactionStatus status = beginTransaction("seedData");
62 AuthorizationGen authzGen = new AuthorizationGen();
63 PermissionsList pl = authzGen.genPermissions();
64 authzGen.writePermissions(pl, PERMISSION_FILE);
65 PermissionsRolesList prl = authzGen.genPermissionsRoles(pl);
66 authzGen.writePermissionRoles(prl, PERMISSION_ROLE_FILE);
69 } catch (Exception ex) {
70 rollbackTransaction(status);
72 throw new RuntimeException(ex);
74 commitTransaction(status);
77 public void seedRoles() throws Exception {
78 //Should this test really be empty?
81 public void seedPermissions() throws Exception {
82 PermissionsList pcList =
83 (PermissionsList) fromFile(PermissionsList.class, baseDir
84 + AbstractAuthorizationTestImpl.testDataDir + PERMISSION_FILE);
85 logger.info("read permissions from "
86 + baseDir + AbstractAuthorizationTestImpl.testDataDir + PERMISSION_FILE);
87 PermissionsRolesList pcrList =
88 (PermissionsRolesList) fromFile(PermissionsRolesList.class, baseDir
89 + AbstractAuthorizationTestImpl.testDataDir + PERMISSION_ROLE_FILE);
90 logger.info("read permissions-roles from "
91 + baseDir + AbstractAuthorizationTestImpl.testDataDir + PERMISSION_ROLE_FILE);
92 AuthZ authZ = AuthZ.get();
93 for (Permission p : pcList.getPermissions()) {
94 if (logger.isDebugEnabled()) {
95 logger.debug("adding permission for res=" + p.getResourceName());
97 for (PermissionRole pr : pcrList.getPermissionRoles()) {
98 if (pr.getPermissions().get(0).getPermissionId().equals(p.getCsid())) {
99 addPermissionsForUri(p, pr);
106 * addPermissionsForUri add permissions from given permission configuration
107 * with assumption that resource is of type URI
108 * @param permission configuration
110 //FIXME this method should be in the restful web service resource of authz
111 private void addPermissionsForUri(Permission perm,
112 PermissionRole permRole) throws PermissionException {
113 List<String> principals = new ArrayList<String>();
114 if (!perm.getCsid().equals(permRole.getPermissions().get(0).getPermissionId())) {
115 throw new IllegalArgumentException("permission ids do not"
116 + " match for role=" + permRole.getRoles().get(0).getRoleName()
117 + " with permissionId=" + permRole.getPermissions().get(0).getPermissionId()
118 + " for permission with csid=" + perm.getCsid());
120 for (RoleValue roleValue : permRole.getRoles()) {
121 principals.add(roleValue.getRoleName());
123 List<PermissionAction> permActions = perm.getActions();
124 for (PermissionAction permAction : permActions) {
125 CSpaceAction action = getAction(permAction.getName());
126 URIResourceImpl uriRes = new URIResourceImpl(perm.getTenantId(),
127 perm.getResourceName(), action);
128 AuthZ.get().addPermissions(uriRes, principals.toArray(new String[0]));
133 * getAction is a convenience method to get corresponding action for
138 private CSpaceAction getAction(ActionType action) {
139 if (ActionType.CREATE.equals(action)) {
140 return CSpaceAction.CREATE;
141 } else if (ActionType.READ.equals(action)) {
142 return CSpaceAction.READ;
143 } else if (ActionType.UPDATE.equals(action)) {
144 return CSpaceAction.UPDATE;
145 } else if (ActionType.DELETE.equals(action)) {
146 return CSpaceAction.DELETE;
147 } else if (ActionType.SEARCH.equals(action)) {
148 return CSpaceAction.SEARCH;
149 } else if (ActionType.ADMIN.equals(action)) {
150 return CSpaceAction.ADMIN;
151 } else if (ActionType.START.equals(action)) {
152 return CSpaceAction.START;
153 } else if (ActionType.STOP.equals(action)) {
154 return CSpaceAction.STOP;
156 throw new IllegalArgumentException("action = " + action.toString());