1 | |
|
2 | |
|
3 | |
|
4 | |
|
5 | |
|
6 | |
|
7 | |
|
8 | |
|
9 | |
|
10 | |
|
11 | |
|
12 | |
|
13 | |
|
14 | |
|
15 | |
|
16 | |
package org.kuali.rice.kew.doctype; |
17 | |
|
18 | |
import org.apache.commons.lang.StringUtils; |
19 | |
import org.kuali.rice.core.api.impex.xml.XmlConstants; |
20 | |
import org.kuali.rice.core.api.util.ConcreteKeyValue; |
21 | |
import org.kuali.rice.core.api.util.KeyValue; |
22 | |
import org.kuali.rice.kew.api.WorkflowRuntimeException; |
23 | |
import org.kuali.rice.kew.api.exception.WorkflowException; |
24 | |
import org.kuali.rice.kew.rule.xmlrouting.XPathHelper; |
25 | |
import org.kuali.rice.kew.util.Utilities; |
26 | |
import org.kuali.rice.kim.api.group.Group; |
27 | |
import org.kuali.rice.kim.api.services.KimApiServiceLocator; |
28 | |
import org.w3c.dom.Element; |
29 | |
import org.w3c.dom.NamedNodeMap; |
30 | |
import org.w3c.dom.Node; |
31 | |
import org.w3c.dom.NodeList; |
32 | |
import org.xml.sax.InputSource; |
33 | |
import org.xml.sax.SAXException; |
34 | |
|
35 | |
import javax.xml.parsers.DocumentBuilderFactory; |
36 | |
import javax.xml.parsers.ParserConfigurationException; |
37 | |
import javax.xml.xpath.XPath; |
38 | |
import javax.xml.xpath.XPathConstants; |
39 | |
import java.io.BufferedReader; |
40 | |
import java.io.IOException; |
41 | |
import java.io.Serializable; |
42 | |
import java.io.StringReader; |
43 | |
import java.util.ArrayList; |
44 | |
import java.util.List; |
45 | |
|
46 | |
|
47 | |
public class DocumentTypeSecurity implements Serializable { |
48 | |
|
49 | |
private static final long serialVersionUID = -1886779857180381404L; |
50 | |
|
51 | 0 | private static final org.apache.log4j.Logger LOG = org.apache.log4j.Logger.getLogger(DocumentTypeSecurity.class); |
52 | |
|
53 | |
private Boolean active; |
54 | |
|
55 | |
private Boolean initiatorOk; |
56 | |
private Boolean routeLogAuthenticatedOk; |
57 | 0 | private List<KeyValue> searchableAttributes = new ArrayList<KeyValue>(); |
58 | 0 | private List<Group> workgroups = new ArrayList<Group>(); |
59 | 0 | private List<SecurityPermissionInfo> permissions = new ArrayList<SecurityPermissionInfo>(); |
60 | 0 | private List<String> allowedRoles = new ArrayList<String>(); |
61 | 0 | private List<String> disallowedRoles = new ArrayList<String>(); |
62 | 0 | private List<String> securityAttributeExtensionNames = new ArrayList<String>(); |
63 | 0 | private List<String> securityAttributeClassNames = new ArrayList<String>(); |
64 | |
|
65 | 0 | private static XPath xpath = XPathHelper.newXPath(); |
66 | |
|
67 | 0 | public DocumentTypeSecurity() {} |
68 | |
|
69 | |
|
70 | |
|
71 | |
|
72 | |
|
73 | |
public DocumentTypeSecurity(String standardApplicationId, String documentTypeSecurityXml) |
74 | 0 | { |
75 | |
try { |
76 | 0 | if (org.apache.commons.lang.StringUtils.isEmpty(documentTypeSecurityXml)) { |
77 | 0 | return; |
78 | |
} |
79 | |
|
80 | 0 | InputSource inputSource = new InputSource(new BufferedReader(new StringReader(documentTypeSecurityXml))); |
81 | 0 | Element securityElement = DocumentBuilderFactory.newInstance().newDocumentBuilder().parse(inputSource).getDocumentElement(); |
82 | |
|
83 | 0 | String active = (String) xpath.evaluate("./@active", securityElement, XPathConstants.STRING); |
84 | 0 | if (org.apache.commons.lang.StringUtils.isEmpty(active) || "true".equals(active.toLowerCase())) { |
85 | |
|
86 | 0 | this.setActive(Boolean.valueOf(true)); |
87 | |
} |
88 | |
else { |
89 | 0 | this.setActive(Boolean.valueOf(false)); |
90 | |
} |
91 | |
|
92 | |
|
93 | 0 | NodeList initiatorNodes = (NodeList) xpath.evaluate("./initiator", securityElement, XPathConstants.NODESET); |
94 | 0 | if (initiatorNodes != null && initiatorNodes.getLength()>0) { |
95 | 0 | Node initiatorNode = initiatorNodes.item(0); |
96 | 0 | String value = initiatorNode.getTextContent(); |
97 | 0 | if (org.apache.commons.lang.StringUtils.isEmpty(value) || value.toLowerCase().equals("true")) { |
98 | 0 | this.setInitiatorOk(Boolean.valueOf(true)); |
99 | |
} |
100 | |
else { |
101 | 0 | this.initiatorOk = Boolean.valueOf(false); |
102 | |
} |
103 | |
} |
104 | |
|
105 | |
|
106 | 0 | NodeList routeLogAuthNodes = (NodeList) xpath.evaluate("./routeLogAuthenticated", securityElement, XPathConstants.NODESET); |
107 | 0 | if (routeLogAuthNodes != null && routeLogAuthNodes.getLength()>0) { |
108 | 0 | Node routeLogAuthNode = routeLogAuthNodes.item(0); |
109 | 0 | String value = routeLogAuthNode.getTextContent(); |
110 | 0 | if (org.apache.commons.lang.StringUtils.isEmpty(value) || value.toLowerCase().equals("true")) { |
111 | 0 | this.routeLogAuthenticatedOk = Boolean.valueOf(true); |
112 | |
} |
113 | |
else { |
114 | 0 | this.routeLogAuthenticatedOk = Boolean.valueOf(false); |
115 | |
} |
116 | |
} |
117 | |
|
118 | 0 | NodeList searchableAttributeNodes = (NodeList) xpath.evaluate("./searchableAttribute", securityElement, XPathConstants.NODESET); |
119 | 0 | if (searchableAttributeNodes != null && searchableAttributeNodes.getLength()>0) { |
120 | 0 | for (int i = 0; i < searchableAttributeNodes.getLength(); i++) { |
121 | 0 | Node searchableAttributeNode = searchableAttributeNodes.item(i); |
122 | 0 | String name = (String) xpath.evaluate("./@name", searchableAttributeNode, XPathConstants.STRING); |
123 | 0 | String idType = (String) xpath.evaluate("./@idType", searchableAttributeNode, XPathConstants.STRING); |
124 | 0 | if (!org.apache.commons.lang.StringUtils.isEmpty(name) && !org.apache.commons.lang.StringUtils.isEmpty(idType)) { |
125 | 0 | KeyValue searchableAttribute = new ConcreteKeyValue(name, idType); |
126 | 0 | searchableAttributes.add(searchableAttribute); |
127 | |
} |
128 | |
} |
129 | |
} |
130 | |
|
131 | 0 | NodeList workgroupNodes = (NodeList) xpath.evaluate("./workgroup", securityElement, XPathConstants.NODESET); |
132 | 0 | if (workgroupNodes != null && workgroupNodes.getLength()>0) { |
133 | 0 | LOG.warn("Document Type Security XML is using deprecated element 'workgroup', please use 'groupName' instead."); |
134 | 0 | for (int i = 0; i < workgroupNodes.getLength(); i++) { |
135 | 0 | Node workgroupNode = workgroupNodes.item(i); |
136 | 0 | String value = workgroupNode.getTextContent().trim(); |
137 | 0 | if (!org.apache.commons.lang.StringUtils.isEmpty(value)) { |
138 | 0 | value = Utilities.substituteConfigParameters(value); |
139 | 0 | String namespaceCode = Utilities.parseGroupNamespaceCode(value); |
140 | 0 | String groupName = Utilities.parseGroupName(value); |
141 | 0 | Group groupObject = KimApiServiceLocator.getGroupService().getGroupByNameAndNamespaceCode(namespaceCode, |
142 | |
groupName); |
143 | 0 | if (groupObject == null) { |
144 | 0 | throw new WorkflowException("Could not find group: " + value); |
145 | |
} |
146 | 0 | workgroups.add(groupObject); |
147 | |
} |
148 | |
} |
149 | |
} |
150 | |
|
151 | 0 | NodeList groupNodes = (NodeList) xpath.evaluate("./groupName", securityElement, XPathConstants.NODESET); |
152 | 0 | if (groupNodes != null && groupNodes.getLength()>0) { |
153 | 0 | for (int i = 0; i < groupNodes.getLength(); i++) { |
154 | 0 | Node groupNode = groupNodes.item(i); |
155 | 0 | if (groupNode.getNodeType() == Node.ELEMENT_NODE) { |
156 | 0 | String groupName = groupNode.getTextContent().trim(); |
157 | 0 | if (!org.apache.commons.lang.StringUtils.isEmpty(groupName)) { |
158 | 0 | groupName = Utilities.substituteConfigParameters(groupName).trim(); |
159 | 0 | String namespaceCode = Utilities.substituteConfigParameters(((Element) groupNode).getAttribute(XmlConstants.NAMESPACE)).trim(); |
160 | 0 | Group groupObject = KimApiServiceLocator.getGroupService().getGroupByNameAndNamespaceCode(namespaceCode, |
161 | |
groupName); |
162 | |
|
163 | |
|
164 | 0 | if (groupObject != null) { |
165 | 0 | workgroups.add(groupObject); |
166 | |
} else { |
167 | 0 | LOG.warn("Could not find group with name '" + groupName + "' and namespace '" + namespaceCode + "' which was defined on Document Type security"); |
168 | |
} |
169 | |
|
170 | |
|
171 | |
|
172 | |
|
173 | |
|
174 | |
} |
175 | |
} |
176 | |
} |
177 | |
} |
178 | |
|
179 | 0 | NodeList permissionNodes = (NodeList) xpath.evaluate("./permission", securityElement, XPathConstants.NODESET); |
180 | 0 | if (permissionNodes != null && permissionNodes.getLength()>0) { |
181 | 0 | for (int i = 0; i < permissionNodes.getLength(); i++) { |
182 | 0 | Node permissionNode = permissionNodes.item(i); |
183 | 0 | if (permissionNode.getNodeType() == Node.ELEMENT_NODE) { |
184 | 0 | SecurityPermissionInfo securityPermission = new SecurityPermissionInfo(); |
185 | 0 | securityPermission.setPermissionName(Utilities.substituteConfigParameters(((Element) permissionNode).getAttribute(XmlConstants.NAME)).trim()); |
186 | 0 | securityPermission.setPermissionNamespaceCode(Utilities.substituteConfigParameters(((Element) permissionNode).getAttribute(XmlConstants.NAMESPACE)).trim()); |
187 | 0 | if (!StringUtils.isEmpty(securityPermission.getPermissionName()) && !StringUtils.isEmpty(securityPermission.getPermissionNamespaceCode())) { |
188 | |
|
189 | 0 | if (permissionNode.hasChildNodes()) { |
190 | 0 | NodeList permissionChildNodes = permissionNode.getChildNodes(); |
191 | 0 | for (int j = 0; j <permissionChildNodes.getLength(); j++) { |
192 | 0 | Node permissionChildNode = permissionChildNodes.item(j); |
193 | 0 | if (permissionChildNode.getNodeType() == Node.ELEMENT_NODE) { |
194 | 0 | String childAttributeName = Utilities.substituteConfigParameters(((Element) permissionChildNode).getAttribute(XmlConstants.NAME)).trim(); |
195 | 0 | String childAttributeValue = permissionChildNode.getTextContent().trim(); |
196 | 0 | if (!StringUtils.isEmpty(childAttributeValue)) { |
197 | 0 | childAttributeValue = Utilities.substituteConfigParameters(childAttributeValue).trim(); |
198 | |
} |
199 | 0 | if (!StringUtils.isEmpty(childAttributeValue)) { |
200 | 0 | childAttributeValue = Utilities.substituteConfigParameters(childAttributeValue).trim(); |
201 | |
} |
202 | 0 | if (permissionChildNode.getNodeName().trim().equals("permissionDetail")) { |
203 | 0 | securityPermission.getPermissionDetails().put(childAttributeName, childAttributeValue); |
204 | |
} |
205 | 0 | if (permissionChildNode.getNodeName().trim().equals("qualification")) { |
206 | 0 | securityPermission.getQualifications().put(childAttributeName, childAttributeValue); |
207 | |
} |
208 | |
} |
209 | |
} |
210 | |
} |
211 | |
|
212 | |
|
213 | 0 | permissions.add(securityPermission); |
214 | |
|
215 | |
|
216 | |
|
217 | |
} |
218 | |
} |
219 | |
} |
220 | |
} |
221 | |
|
222 | 0 | NodeList roleNodes = (NodeList) xpath.evaluate("./role", securityElement, XPathConstants.NODESET); |
223 | 0 | if (roleNodes != null && roleNodes.getLength()>0) { |
224 | 0 | for (int i = 0; i < roleNodes.getLength(); i++) { |
225 | 0 | Element roleElement = (Element)roleNodes.item(i); |
226 | 0 | String value = roleElement.getTextContent().trim(); |
227 | 0 | String allowedValue = roleElement.getAttribute("allowed"); |
228 | 0 | if (StringUtils.isBlank(allowedValue)) { |
229 | 0 | allowedValue = "true"; |
230 | |
} |
231 | 0 | if (!org.apache.commons.lang.StringUtils.isEmpty(value)) { |
232 | 0 | if (Boolean.parseBoolean(allowedValue)) { |
233 | 0 | allowedRoles.add(value); |
234 | |
} else { |
235 | 0 | disallowedRoles.add(value); |
236 | |
} |
237 | |
} |
238 | |
} |
239 | |
} |
240 | |
|
241 | 0 | NodeList attributeNodes = (NodeList) xpath.evaluate("./securityAttribute", securityElement, XPathConstants.NODESET); |
242 | 0 | if (attributeNodes != null && attributeNodes.getLength()>0) { |
243 | 0 | for (int i = 0; i < attributeNodes.getLength(); i++) { |
244 | 0 | Element attributeElement = (Element)attributeNodes.item(i); |
245 | 0 | NamedNodeMap elemAttributes = attributeElement.getAttributes(); |
246 | |
|
247 | 0 | String attributeOrClassName = null; |
248 | 0 | String applicationId = standardApplicationId; |
249 | 0 | if (elemAttributes.getNamedItem("name") != null) { |
250 | |
|
251 | 0 | String extensionName = elemAttributes.getNamedItem("name").getNodeValue().trim(); |
252 | 0 | this.securityAttributeExtensionNames.add(extensionName); |
253 | 0 | } else if (elemAttributes.getNamedItem("class") != null) { |
254 | |
|
255 | 0 | String className = elemAttributes.getNamedItem("class").getNodeValue().trim(); |
256 | 0 | this.securityAttributeClassNames.add(className); |
257 | 0 | } else { |
258 | 0 | throw new WorkflowException("Cannot find attribute 'name' or attribute 'class' for securityAttribute Node"); |
259 | |
} |
260 | |
} |
261 | |
} |
262 | 0 | } catch (Exception err) { |
263 | 0 | throw new WorkflowRuntimeException(err); |
264 | 0 | } |
265 | 0 | } |
266 | |
|
267 | |
public List<String> getSecurityAttributeExtensionNames() { |
268 | 0 | return this.securityAttributeExtensionNames; |
269 | |
} |
270 | |
|
271 | |
public void setSecurityAttributeExtensionNames(List<String> securityAttributeExtensionNames) { |
272 | 0 | this.securityAttributeExtensionNames = securityAttributeExtensionNames; |
273 | 0 | } |
274 | |
|
275 | |
public List<String> getSecurityAttributeClassNames() { |
276 | 0 | return securityAttributeClassNames; |
277 | |
} |
278 | |
|
279 | |
public void setSecurityAttributeClassNames(List<String> securityAttributeClassNames) { |
280 | 0 | this.securityAttributeClassNames = securityAttributeClassNames; |
281 | 0 | } |
282 | |
|
283 | |
public Boolean getInitiatorOk() { |
284 | 0 | return initiatorOk; |
285 | |
} |
286 | |
public void setInitiatorOk(Boolean initiatorOk) { |
287 | 0 | this.initiatorOk = initiatorOk; |
288 | 0 | } |
289 | |
|
290 | |
public Boolean getRouteLogAuthenticatedOk() { |
291 | 0 | return routeLogAuthenticatedOk; |
292 | |
} |
293 | |
public void setRouteLogAuthenticatedOk(Boolean routeLogAuthenticatedOk) { |
294 | 0 | this.routeLogAuthenticatedOk = routeLogAuthenticatedOk; |
295 | 0 | } |
296 | |
|
297 | |
public List<String> getAllowedRoles() { |
298 | 0 | return allowedRoles; |
299 | |
} |
300 | |
|
301 | |
public void setAllowedRoles(List<String> allowedRoles) { |
302 | 0 | this.allowedRoles = allowedRoles; |
303 | 0 | } |
304 | |
|
305 | |
public List<String> getDisallowedRoles() { |
306 | 0 | return disallowedRoles; |
307 | |
} |
308 | |
|
309 | |
public void setDisallowedRoles(List<String> disallowedRoles) { |
310 | 0 | this.disallowedRoles = disallowedRoles; |
311 | 0 | } |
312 | |
|
313 | |
public List<KeyValue> getSearchableAttributes() { |
314 | 0 | return searchableAttributes; |
315 | |
} |
316 | |
|
317 | |
public void setSearchableAttributes(List<KeyValue> searchableAttributes) { |
318 | 0 | this.searchableAttributes = searchableAttributes; |
319 | 0 | } |
320 | |
|
321 | |
public List<Group> getWorkgroups() { |
322 | 0 | return workgroups; |
323 | |
} |
324 | |
|
325 | |
public void setWorkgroups(List<Group> workgroups) { |
326 | 0 | this.workgroups = workgroups; |
327 | 0 | } |
328 | |
|
329 | |
public List<SecurityPermissionInfo> getPermissions() { |
330 | 0 | return this.permissions; |
331 | |
} |
332 | |
|
333 | |
public void setPermissions(List<SecurityPermissionInfo> permissions) { |
334 | 0 | this.permissions = permissions; |
335 | 0 | } |
336 | |
|
337 | |
public Boolean getActive() { |
338 | 0 | return active; |
339 | |
} |
340 | |
|
341 | |
public void setActive(Boolean active) { |
342 | 0 | this.active = active; |
343 | 0 | } |
344 | |
|
345 | |
public boolean isActive() { |
346 | 0 | if (active != null) { |
347 | 0 | return active.booleanValue(); |
348 | |
} |
349 | |
else { |
350 | 0 | return false; |
351 | |
} |
352 | |
} |
353 | |
} |