| 1 | |
|
| 2 | |
|
| 3 | |
|
| 4 | |
|
| 5 | |
|
| 6 | |
|
| 7 | |
|
| 8 | |
|
| 9 | |
|
| 10 | |
|
| 11 | |
|
| 12 | |
|
| 13 | |
|
| 14 | |
|
| 15 | |
|
| 16 | |
package org.kuali.rice.kew.doctype.service.impl; |
| 17 | |
|
| 18 | |
import org.apache.commons.collections.CollectionUtils; |
| 19 | |
import org.apache.commons.lang.StringUtils; |
| 20 | |
import org.apache.commons.lang.builder.EqualsBuilder; |
| 21 | |
import org.apache.commons.lang.builder.HashCodeBuilder; |
| 22 | |
import org.kuali.rice.core.api.CoreConstants; |
| 23 | |
import org.kuali.rice.core.api.datetime.DateTimeService; |
| 24 | |
import org.kuali.rice.core.api.reflect.ObjectDefinition; |
| 25 | |
import org.kuali.rice.core.api.resourceloader.GlobalResourceLoader; |
| 26 | |
import org.kuali.rice.core.api.util.KeyValue; |
| 27 | |
import org.kuali.rice.kew.api.KewApiServiceLocator; |
| 28 | |
import org.kuali.rice.kew.api.WorkflowRuntimeException; |
| 29 | |
import org.kuali.rice.kew.api.document.Document; |
| 30 | |
import org.kuali.rice.kew.api.document.search.DocumentSearchResult; |
| 31 | |
import org.kuali.rice.kew.api.document.search.DocumentSearchResults; |
| 32 | |
import org.kuali.rice.kew.api.extension.ExtensionDefinition; |
| 33 | |
import org.kuali.rice.kew.api.extension.ExtensionRepositoryService; |
| 34 | |
import org.kuali.rice.kew.doctype.DocumentTypeSecurity; |
| 35 | |
import org.kuali.rice.kew.framework.KewFrameworkServiceLocator; |
| 36 | |
import org.kuali.rice.kew.framework.document.security.DocumentSecurityDirective; |
| 37 | |
import org.kuali.rice.kew.framework.document.security.DocumentSecurityHandlerService; |
| 38 | |
import org.kuali.rice.kew.framework.document.security.DocumentSecurityAttribute; |
| 39 | |
import org.kuali.rice.kew.doctype.SecurityPermissionInfo; |
| 40 | |
import org.kuali.rice.kew.doctype.SecuritySession; |
| 41 | |
import org.kuali.rice.kew.doctype.bo.DocumentType; |
| 42 | |
import org.kuali.rice.kew.doctype.service.DocumentSecurityService; |
| 43 | |
import org.kuali.rice.kew.routeheader.DocumentRouteHeaderValue; |
| 44 | |
import org.kuali.rice.kew.service.KEWServiceLocator; |
| 45 | |
import org.kuali.rice.kew.user.UserUtils; |
| 46 | |
import org.kuali.rice.kew.api.KewApiConstants; |
| 47 | |
import org.kuali.rice.kim.api.group.Group; |
| 48 | |
import org.kuali.rice.kim.api.services.KimApiServiceLocator; |
| 49 | |
import org.springframework.util.LinkedMultiValueMap; |
| 50 | |
import org.springframework.util.MultiValueMap; |
| 51 | |
|
| 52 | |
import java.lang.reflect.Field; |
| 53 | |
import java.util.ArrayList; |
| 54 | |
import java.util.Calendar; |
| 55 | |
import java.util.Collection; |
| 56 | |
import java.util.Collections; |
| 57 | |
import java.util.HashMap; |
| 58 | |
import java.util.HashSet; |
| 59 | |
import java.util.Iterator; |
| 60 | |
import java.util.List; |
| 61 | |
import java.util.Map; |
| 62 | |
import java.util.Set; |
| 63 | |
|
| 64 | 0 | public class DocumentSecurityServiceImpl implements DocumentSecurityService { |
| 65 | |
|
| 66 | 0 | public static final org.apache.log4j.Logger LOG = org.apache.log4j.Logger.getLogger( |
| 67 | |
DocumentSecurityServiceImpl.class); |
| 68 | |
|
| 69 | |
private ExtensionRepositoryService extensionRepositoryService; |
| 70 | |
|
| 71 | |
@Override |
| 72 | |
public boolean routeLogAuthorized(String principalId, DocumentRouteHeaderValue routeHeader, |
| 73 | |
SecuritySession securitySession) { |
| 74 | 0 | List<Document> documents = Collections.singletonList(DocumentRouteHeaderValue.to(routeHeader)); |
| 75 | 0 | Set<String> authorizationResults = checkAuthorizations(principalId, securitySession, documents); |
| 76 | 0 | return authorizationResults.contains(routeHeader.getDocumentId()); |
| 77 | |
} |
| 78 | |
|
| 79 | |
@Override |
| 80 | |
public Set<String> documentSearchResultAuthorized(String principalId, DocumentSearchResults results, |
| 81 | |
SecuritySession securitySession) { |
| 82 | 0 | List<Document> documents = new ArrayList<Document>(); |
| 83 | 0 | for (DocumentSearchResult result : results.getSearchResults()) { |
| 84 | 0 | documents.add(result.getDocument()); |
| 85 | |
} |
| 86 | 0 | return checkAuthorizations(principalId, securitySession, documents); |
| 87 | |
} |
| 88 | |
|
| 89 | |
protected Set<String> checkAuthorizations(String principalId, SecuritySession securitySession, |
| 90 | |
List<Document> documents) { |
| 91 | 0 | Set<String> authorizations = new HashSet<String>(); |
| 92 | |
|
| 93 | |
|
| 94 | 0 | List<Document> documentsRequiringExtensionProcessing = new ArrayList<Document>(); |
| 95 | 0 | boolean admin = isAdmin(securitySession); |
| 96 | 0 | for (Document document : documents) { |
| 97 | 0 | if (admin) { |
| 98 | 0 | authorizations.add(document.getDocumentId()); |
| 99 | 0 | continue; |
| 100 | |
} |
| 101 | 0 | DocumentTypeSecurity security = null; |
| 102 | |
try { |
| 103 | 0 | security = getDocumentTypeSecurity(document.getDocumentTypeName(), securitySession); |
| 104 | 0 | if (security == null || !security.isActive() || checkStandardAuthorization(security, principalId, |
| 105 | |
document, securitySession)) { |
| 106 | 0 | authorizations.add(document.getDocumentId()); |
| 107 | |
} else { |
| 108 | |
|
| 109 | |
|
| 110 | 0 | if (CollectionUtils.isNotEmpty(security.getSecurityAttributeExtensionNames())) { |
| 111 | 0 | documentsRequiringExtensionProcessing.add(document); |
| 112 | |
} |
| 113 | |
} |
| 114 | 0 | } catch (Exception e) { |
| 115 | 0 | LOG.warn( |
| 116 | |
"Not able to retrieve DocumentTypeSecurity from remote system for documentTypeName: " + document |
| 117 | |
.getDocumentTypeName(), e); |
| 118 | 0 | continue; |
| 119 | 0 | } |
| 120 | 0 | } |
| 121 | 0 | processDocumentRequiringExtensionProcessing(documentsRequiringExtensionProcessing, securitySession, |
| 122 | |
authorizations); |
| 123 | 0 | return authorizations; |
| 124 | |
} |
| 125 | |
|
| 126 | |
protected void processDocumentRequiringExtensionProcessing(List<Document> documentsRequiringExtensionProcessing, |
| 127 | |
SecuritySession securitySession, Set<String> authorizations) { |
| 128 | 0 | if (CollectionUtils.isNotEmpty(documentsRequiringExtensionProcessing)) { |
| 129 | 0 | LOG.info("Beginning processing of documents requiring extension processing (total: " |
| 130 | |
+ documentsRequiringExtensionProcessing.size() |
| 131 | |
+ " documents)"); |
| 132 | 0 | long start = System.currentTimeMillis(); |
| 133 | 0 | MultiValueMap<PartitionKey, Document> partitions = partitionDocumentsForSecurity( |
| 134 | |
documentsRequiringExtensionProcessing, securitySession); |
| 135 | 0 | MultiValueMap<String, DocumentSecurityDirective> applicationSecurityDirectives = |
| 136 | |
new LinkedMultiValueMap<String, DocumentSecurityDirective>(); |
| 137 | 0 | for (PartitionKey partitionKey : partitions.keySet()) { |
| 138 | 0 | DocumentSecurityDirective directive = DocumentSecurityDirective.create( |
| 139 | |
partitionKey.getDocumentSecurityAttributeNameList(), partitions.get(partitionKey)); |
| 140 | 0 | applicationSecurityDirectives.add(partitionKey.applicationId, directive); |
| 141 | 0 | } |
| 142 | 0 | for (String applicationId : applicationSecurityDirectives.keySet()) { |
| 143 | 0 | List<DocumentSecurityDirective> documentSecurityDirectives = applicationSecurityDirectives.get( |
| 144 | |
applicationId); |
| 145 | 0 | DocumentSecurityHandlerService securityHandler = loadSecurityHandler(applicationId); |
| 146 | 0 | List<String> authorizedDocumentIds = securityHandler.getAuthorizedDocumentIds( |
| 147 | |
securitySession.getPrincipalId(), documentSecurityDirectives); |
| 148 | 0 | if (CollectionUtils.isNotEmpty(authorizedDocumentIds)) { |
| 149 | 0 | authorizations.addAll(authorizedDocumentIds); |
| 150 | |
} |
| 151 | 0 | } |
| 152 | 0 | long end = System.currentTimeMillis(); |
| 153 | 0 | LOG.info("Finished processing of documents requiring extension processing (total time: " |
| 154 | |
+ (start - end) |
| 155 | |
+ ")"); |
| 156 | |
} |
| 157 | 0 | } |
| 158 | |
|
| 159 | |
protected MultiValueMap<PartitionKey, Document> partitionDocumentsForSecurity(List<Document> documents, |
| 160 | |
SecuritySession securitySession) { |
| 161 | 0 | MultiValueMap<PartitionKey, Document> partitions = new LinkedMultiValueMap<PartitionKey, Document>(); |
| 162 | 0 | for (Document document : documents) { |
| 163 | 0 | DocumentTypeSecurity security = getDocumentTypeSecurity(document.getDocumentTypeName(), securitySession); |
| 164 | 0 | MultiValueMap<String, ExtensionDefinition> securityAttributeExtensionDefinitions = loadExtensionDefinitions( |
| 165 | |
security, securitySession); |
| 166 | 0 | for (String applicationId : securityAttributeExtensionDefinitions.keySet()) { |
| 167 | 0 | List<ExtensionDefinition> extensionDefinitions = securityAttributeExtensionDefinitions.get( |
| 168 | |
applicationId); |
| 169 | 0 | PartitionKey key = new PartitionKey(applicationId, extensionDefinitions); |
| 170 | 0 | partitions.add(key, document); |
| 171 | 0 | } |
| 172 | 0 | } |
| 173 | 0 | return partitions; |
| 174 | |
} |
| 175 | |
|
| 176 | |
protected MultiValueMap<String, ExtensionDefinition> loadExtensionDefinitions(DocumentTypeSecurity security, |
| 177 | |
SecuritySession securitySession) { |
| 178 | 0 | MultiValueMap<String, ExtensionDefinition> securityAttributeExtensionDefinitions = |
| 179 | |
new LinkedMultiValueMap<String, ExtensionDefinition>(); |
| 180 | 0 | List<String> securityAttributeExtensionNames = security.getSecurityAttributeExtensionNames(); |
| 181 | 0 | for (String securityAttributeExtensionName : securityAttributeExtensionNames) { |
| 182 | 0 | ExtensionDefinition extensionDefinition = extensionRepositoryService.getExtensionByName( |
| 183 | |
securityAttributeExtensionName); |
| 184 | 0 | securityAttributeExtensionDefinitions.add(extensionDefinition.getApplicationId(), extensionDefinition); |
| 185 | 0 | } |
| 186 | 0 | return securityAttributeExtensionDefinitions; |
| 187 | |
} |
| 188 | |
|
| 189 | |
protected DocumentSecurityHandlerService loadSecurityHandler(String applicationId) { |
| 190 | 0 | DocumentSecurityHandlerService service = KewFrameworkServiceLocator.getDocumentSecurityHandlerService( |
| 191 | |
applicationId); |
| 192 | 0 | if (service == null) { |
| 193 | 0 | throw new WorkflowRuntimeException( |
| 194 | |
"Failed to locate DocumentSecurityHandlerService for applicationId: " + applicationId); |
| 195 | |
} |
| 196 | 0 | return service; |
| 197 | |
} |
| 198 | |
|
| 199 | |
protected boolean isAdmin(SecuritySession session) { |
| 200 | 0 | if (session.getPrincipalId() == null) { |
| 201 | 0 | return false; |
| 202 | |
} |
| 203 | 0 | return KimApiServiceLocator.getPermissionService().isAuthorized(session.getPrincipalId(), |
| 204 | |
KewApiConstants.KEW_NAMESPACE, KewApiConstants.PermissionNames.UNRESTRICTED_DOCUMENT_SEARCH, |
| 205 | |
new HashMap<String, String>(), new HashMap<String, String>()); |
| 206 | |
} |
| 207 | |
|
| 208 | |
protected boolean checkStandardAuthorization(DocumentTypeSecurity security, String principalId, Document document, |
| 209 | |
SecuritySession securitySession) { |
| 210 | 0 | String documentId = document.getDocumentId(); |
| 211 | 0 | String initiatorPrincipalId = document.getInitiatorPrincipalId(); |
| 212 | |
|
| 213 | 0 | LOG.debug("auth check user=" + principalId + " docId=" + documentId); |
| 214 | |
|
| 215 | |
|
| 216 | 0 | if (security.getInitiatorOk() != null && security.getInitiatorOk()) { |
| 217 | 0 | boolean isInitiator = StringUtils.equals(initiatorPrincipalId, principalId); |
| 218 | 0 | if (isInitiator) { |
| 219 | 0 | return true; |
| 220 | |
} |
| 221 | |
} |
| 222 | |
|
| 223 | |
|
| 224 | 0 | List<SecurityPermissionInfo> securityPermissions = security.getPermissions(); |
| 225 | 0 | if (securityPermissions != null) { |
| 226 | 0 | for (SecurityPermissionInfo securityPermission : securityPermissions) { |
| 227 | 0 | if (isAuthenticatedByPermission(documentId, securityPermission.getPermissionNamespaceCode(), |
| 228 | |
securityPermission.getPermissionName(), securityPermission.getPermissionDetails(), |
| 229 | |
securityPermission.getQualifications(), securitySession)) { |
| 230 | 0 | return true; |
| 231 | |
} |
| 232 | |
} |
| 233 | |
} |
| 234 | |
|
| 235 | |
|
| 236 | 0 | List<Group> securityWorkgroups = security.getWorkgroups(); |
| 237 | 0 | if (securityWorkgroups != null) { |
| 238 | 0 | for (Group securityWorkgroup : securityWorkgroups) { |
| 239 | 0 | if (isGroupAuthenticated(securityWorkgroup.getNamespaceCode(), securityWorkgroup.getName(), |
| 240 | |
securitySession)) { |
| 241 | 0 | return true; |
| 242 | |
} |
| 243 | |
} |
| 244 | |
} |
| 245 | |
|
| 246 | |
|
| 247 | 0 | Collection searchableAttributes = security.getSearchableAttributes(); |
| 248 | 0 | if (searchableAttributes != null) { |
| 249 | 0 | for (Iterator iterator = searchableAttributes.iterator(); iterator.hasNext(); ) { |
| 250 | 0 | KeyValue searchableAttr = (KeyValue) iterator.next(); |
| 251 | 0 | String attrName = searchableAttr.getKey(); |
| 252 | 0 | String idType = searchableAttr.getValue(); |
| 253 | 0 | String idValue = UserUtils.getIdValue(idType, principalId); |
| 254 | 0 | if (!StringUtils.isEmpty(idValue)) { |
| 255 | 0 | if (KEWServiceLocator.getRouteHeaderService().hasSearchableAttributeValue(documentId, attrName, |
| 256 | |
idValue)) { |
| 257 | 0 | return true; |
| 258 | |
} |
| 259 | |
} |
| 260 | 0 | } |
| 261 | |
} |
| 262 | |
|
| 263 | |
|
| 264 | 0 | if (security.getRouteLogAuthenticatedOk() != null && security.getRouteLogAuthenticatedOk()) { |
| 265 | 0 | boolean isInitiator = StringUtils.equals(initiatorPrincipalId, principalId); |
| 266 | 0 | if (isInitiator) { |
| 267 | 0 | return true; |
| 268 | |
} |
| 269 | 0 | boolean hasTakenAction = KEWServiceLocator.getActionTakenService().hasUserTakenAction(principalId, |
| 270 | |
documentId); |
| 271 | 0 | if (hasTakenAction) { |
| 272 | 0 | return true; |
| 273 | |
} |
| 274 | 0 | boolean hasRequest = KEWServiceLocator.getActionRequestService().doesPrincipalHaveRequest(principalId, |
| 275 | |
documentId); |
| 276 | 0 | if (hasRequest) { |
| 277 | 0 | return true; |
| 278 | |
} |
| 279 | |
} |
| 280 | |
|
| 281 | |
|
| 282 | 0 | List<DocumentSecurityAttribute> immediateSecurityAttributes = getImmediateSecurityAttributes(document, security, |
| 283 | |
securitySession); |
| 284 | 0 | if (immediateSecurityAttributes != null) { |
| 285 | 0 | for (DocumentSecurityAttribute immediateSecurityAttribute : immediateSecurityAttributes) { |
| 286 | 0 | boolean isAuthorized = immediateSecurityAttribute.isAuthorizedForDocument(principalId, document); |
| 287 | 0 | if (isAuthorized) { |
| 288 | 0 | return true; |
| 289 | |
} |
| 290 | 0 | } |
| 291 | |
} |
| 292 | |
|
| 293 | 0 | LOG.debug("user not authorized"); |
| 294 | 0 | return false; |
| 295 | |
} |
| 296 | |
|
| 297 | |
protected List<DocumentSecurityAttribute> getImmediateSecurityAttributes(Document document, DocumentTypeSecurity security, |
| 298 | |
SecuritySession securitySession) { |
| 299 | 0 | List<DocumentSecurityAttribute> securityAttributes = new ArrayList<DocumentSecurityAttribute>(); |
| 300 | 0 | for (String securityAttributeClassName : security.getSecurityAttributeClassNames()) { |
| 301 | 0 | DocumentSecurityAttribute securityAttribute = securitySession.getSecurityAttributeForClass( |
| 302 | |
securityAttributeClassName); |
| 303 | 0 | if (securityAttribute == null) { |
| 304 | 0 | securityAttribute = GlobalResourceLoader.getObject(new ObjectDefinition(securityAttributeClassName)); |
| 305 | 0 | securitySession.setSecurityAttributeForClass(securityAttributeClassName, securityAttribute); |
| 306 | |
} |
| 307 | 0 | securityAttributes.add(securityAttribute); |
| 308 | 0 | } |
| 309 | 0 | return securityAttributes; |
| 310 | |
} |
| 311 | |
|
| 312 | |
protected DocumentTypeSecurity getDocumentTypeSecurity(String documentTypeName, SecuritySession session) { |
| 313 | 0 | DocumentTypeSecurity security = session.getDocumentTypeSecurity().get(documentTypeName); |
| 314 | 0 | if (security == null) { |
| 315 | 0 | DocumentType docType = KEWServiceLocator.getDocumentTypeService().findByName(documentTypeName); |
| 316 | 0 | security = docType.getDocumentTypeSecurity(); |
| 317 | 0 | session.getDocumentTypeSecurity().put(documentTypeName, security); |
| 318 | |
} |
| 319 | 0 | return security; |
| 320 | |
} |
| 321 | |
|
| 322 | |
protected boolean isGroupAuthenticated(String namespace, String groupName, SecuritySession session) { |
| 323 | 0 | String key = namespace.trim() + KewApiConstants.KIM_GROUP_NAMESPACE_NAME_DELIMITER_CHARACTER + groupName.trim(); |
| 324 | 0 | Boolean existingAuth = session.getAuthenticatedWorkgroups().get(key); |
| 325 | 0 | if (existingAuth != null) { |
| 326 | 0 | return existingAuth; |
| 327 | |
} |
| 328 | 0 | boolean memberOfGroup = isMemberOfGroupWithName(namespace, groupName, session.getPrincipalId()); |
| 329 | 0 | session.getAuthenticatedWorkgroups().put(key, memberOfGroup); |
| 330 | 0 | return memberOfGroup; |
| 331 | |
} |
| 332 | |
|
| 333 | |
private boolean isMemberOfGroupWithName(String namespace, String groupName, String principalId) { |
| 334 | 0 | for (Group group : KimApiServiceLocator.getGroupService().getGroupsByPrincipalId(principalId)) { |
| 335 | 0 | if (StringUtils.equals(namespace, group.getNamespaceCode()) && StringUtils.equals(groupName, |
| 336 | |
group.getName())) { |
| 337 | 0 | return true; |
| 338 | |
} |
| 339 | |
} |
| 340 | 0 | return false; |
| 341 | |
} |
| 342 | |
|
| 343 | |
protected boolean isAuthenticatedByPermission(String documentId, String permissionNamespaceCode, |
| 344 | |
String permissionName, Map<String, String> permissionDetails, Map<String, String> qualification, |
| 345 | |
SecuritySession session) { |
| 346 | |
|
| 347 | |
Document document; |
| 348 | |
try { |
| 349 | 0 | document = KewApiServiceLocator.getWorkflowDocumentService().getDocument(documentId); |
| 350 | |
|
| 351 | 0 | for (String qualificationKey : qualification.keySet()) { |
| 352 | 0 | String qualificationValue = qualification.get(qualificationKey); |
| 353 | 0 | String replacementValue = getReplacementString(document, qualificationValue); |
| 354 | 0 | qualification.put(qualificationKey, replacementValue); |
| 355 | 0 | } |
| 356 | |
|
| 357 | 0 | for (String permissionDetailKey : permissionDetails.keySet()) { |
| 358 | 0 | String detailValue = qualification.get(permissionDetailKey); |
| 359 | 0 | String replacementValue = getReplacementString(document, detailValue); |
| 360 | 0 | qualification.put(permissionDetailKey, replacementValue); |
| 361 | 0 | } |
| 362 | 0 | } catch (Exception e) { |
| 363 | 0 | LOG.error(e.getMessage(), e); |
| 364 | 0 | return false; |
| 365 | 0 | } |
| 366 | 0 | return KimApiServiceLocator.getPermissionService().isAuthorized(session.getPrincipalId(), |
| 367 | |
permissionNamespaceCode, permissionName, permissionDetails, qualification); |
| 368 | |
} |
| 369 | |
|
| 370 | |
private String getReplacementString(Document document, String value) throws Exception { |
| 371 | 0 | String startsWith = "${document."; |
| 372 | 0 | String endsWith = "}"; |
| 373 | 0 | if (value.startsWith(startsWith)) { |
| 374 | 0 | int tokenStart = value.indexOf(startsWith); |
| 375 | 0 | int tokenEnd = value.indexOf(endsWith, tokenStart + startsWith.length()); |
| 376 | 0 | if (tokenEnd == -1) { |
| 377 | 0 | throw new RuntimeException("No ending bracket on token in value " + value); |
| 378 | |
} |
| 379 | 0 | String token = value.substring(tokenStart + startsWith.length(), tokenEnd); |
| 380 | |
|
| 381 | 0 | return getRouteHeaderVariableValue(document, token); |
| 382 | |
} |
| 383 | 0 | return value; |
| 384 | |
|
| 385 | |
} |
| 386 | |
|
| 387 | |
private String getRouteHeaderVariableValue(Document document, String variableName) throws Exception { |
| 388 | |
Field field; |
| 389 | |
try { |
| 390 | 0 | field = document.getClass().getDeclaredField(variableName); |
| 391 | 0 | } catch (NoSuchFieldException nsfe) { |
| 392 | 0 | LOG.error("Field '" + variableName + "' not found on Document object."); |
| 393 | |
|
| 394 | |
|
| 395 | |
|
| 396 | 0 | return null; |
| 397 | 0 | } |
| 398 | 0 | field.setAccessible(true); |
| 399 | 0 | Object fieldValue = field.get(document); |
| 400 | 0 | Class<?> clazzType = field.getType(); |
| 401 | 0 | if (clazzType.equals(String.class)) { |
| 402 | 0 | return (String) fieldValue; |
| 403 | 0 | } else if (clazzType.getName().equals("boolean") || clazzType.getName().equals("java.lang.Boolean")) { |
| 404 | 0 | if ((Boolean) fieldValue) { |
| 405 | 0 | return "Y"; |
| 406 | |
} |
| 407 | 0 | return "N"; |
| 408 | 0 | } else if (clazzType.getName().equals("java.util.Calendar")) { |
| 409 | |
|
| 410 | 0 | DateTimeService dateTimeService = GlobalResourceLoader.getService(CoreConstants.Services.DATETIME_SERVICE); |
| 411 | 0 | return dateTimeService.toDateString(((Calendar) fieldValue).getTime()); |
| 412 | |
} |
| 413 | 0 | return String.valueOf(fieldValue); |
| 414 | |
} |
| 415 | |
|
| 416 | |
public ExtensionRepositoryService getExtensionRepositoryService() { |
| 417 | 0 | return extensionRepositoryService; |
| 418 | |
} |
| 419 | |
|
| 420 | |
public void setExtensionRepositoryService(ExtensionRepositoryService extensionRepositoryService) { |
| 421 | 0 | this.extensionRepositoryService = extensionRepositoryService; |
| 422 | 0 | } |
| 423 | |
|
| 424 | |
|
| 425 | |
|
| 426 | |
|
| 427 | |
|
| 428 | |
|
| 429 | 0 | private static final class PartitionKey { |
| 430 | |
String applicationId; |
| 431 | |
Set<String> documentSecurityAttributeNames; |
| 432 | |
|
| 433 | 0 | PartitionKey(String applicationId, Collection<ExtensionDefinition> extensionDefinitions) { |
| 434 | 0 | this.applicationId = applicationId; |
| 435 | 0 | this.documentSecurityAttributeNames = new HashSet<String>(); |
| 436 | 0 | for (ExtensionDefinition extensionDefinition : extensionDefinitions) { |
| 437 | 0 | this.documentSecurityAttributeNames.add(extensionDefinition.getName()); |
| 438 | |
} |
| 439 | 0 | } |
| 440 | |
|
| 441 | |
List<String> getDocumentSecurityAttributeNameList() { |
| 442 | 0 | return new ArrayList<String>(documentSecurityAttributeNames); |
| 443 | |
} |
| 444 | |
|
| 445 | |
@Override |
| 446 | |
public boolean equals(Object o) { |
| 447 | 0 | if (!(o instanceof PartitionKey)) { |
| 448 | 0 | return false; |
| 449 | |
} |
| 450 | 0 | PartitionKey key = (PartitionKey) o; |
| 451 | 0 | EqualsBuilder builder = new EqualsBuilder(); |
| 452 | 0 | builder.append(applicationId, key.applicationId); |
| 453 | 0 | builder.append(documentSecurityAttributeNames, key.documentSecurityAttributeNames); |
| 454 | 0 | return builder.isEquals(); |
| 455 | |
} |
| 456 | |
|
| 457 | |
@Override |
| 458 | |
public int hashCode() { |
| 459 | 0 | HashCodeBuilder builder = new HashCodeBuilder(); |
| 460 | 0 | builder.append(applicationId); |
| 461 | 0 | builder.append(documentSecurityAttributeNames); |
| 462 | 0 | return builder.hashCode(); |
| 463 | |
} |
| 464 | |
} |
| 465 | |
|
| 466 | |
} |