1 | |
|
2 | |
|
3 | |
|
4 | |
|
5 | |
|
6 | |
|
7 | |
|
8 | |
|
9 | |
|
10 | |
|
11 | |
|
12 | |
|
13 | |
|
14 | |
|
15 | |
|
16 | |
package org.kuali.rice.krad.uif.authorization; |
17 | |
|
18 | |
import org.apache.commons.logging.Log; |
19 | |
import org.apache.commons.logging.LogFactory; |
20 | |
import org.kuali.rice.kew.api.KewApiServiceLocator; |
21 | |
import org.kuali.rice.kew.api.WorkflowDocument; |
22 | |
import org.kuali.rice.kew.api.doctype.Process; |
23 | |
import org.kuali.rice.kew.api.doctype.RoutePath; |
24 | |
import org.kuali.rice.kew.util.KEWConstants; |
25 | |
import org.kuali.rice.kim.bo.Person; |
26 | |
import org.kuali.rice.kim.util.KimConstants; |
27 | |
import org.kuali.rice.krad.document.Document; |
28 | |
import org.kuali.rice.krad.service.KRADServiceLocatorWeb; |
29 | |
import org.kuali.rice.krad.util.KRADConstants; |
30 | |
import org.kuali.rice.krad.web.form.DocumentFormBase; |
31 | |
import org.kuali.rice.krad.web.form.UifFormBase; |
32 | |
|
33 | |
import java.util.HashMap; |
34 | |
import java.util.Map; |
35 | |
import java.util.Set; |
36 | |
|
37 | |
|
38 | |
|
39 | |
|
40 | 0 | public class DocumentAuthorizerBase extends AuthorizerBase { |
41 | 0 | protected static Log LOG = LogFactory.getLog(DocumentAuthorizerBase.class); |
42 | |
|
43 | |
public static final String PRE_ROUTING_ROUTE_NAME = "PreRoute"; |
44 | |
public static final String EDIT_MODE_DEFAULT_TRUE_VALUE = "TRUE"; |
45 | |
public static final String USER_SESSION_METHOD_TO_CALL_OBJECT_KEY = "METHOD_TO_CALL_KEYS_METHOD_OBJECT_KEY"; |
46 | |
public static final String USER_SESSION_METHOD_TO_CALL_COMPLETE_OBJECT_KEY = "METHOD_TO_CALL_KEYS_COMPLETE_OBJECT_KEY"; |
47 | |
|
48 | |
@Override |
49 | |
public Set<String> getActionFlags(UifFormBase model, Person user, Set<String> documentActions) { |
50 | 0 | Document document = ((DocumentFormBase) model).getDocument(); |
51 | |
|
52 | 0 | if (LOG.isDebugEnabled()) { |
53 | 0 | LOG.debug("calling DocumentAuthorizerBase.getDocumentActionFlags for document '" |
54 | |
+ document.getDocumentNumber() + "'. user '" + user.getPrincipalName() + "'"); |
55 | |
} |
56 | |
|
57 | 0 | if (documentActions.contains(KRADConstants.KUALI_ACTION_CAN_EDIT) |
58 | |
&& !isAuthorizedByTemplate(document, KRADConstants.KRAD_NAMESPACE, |
59 | |
KimConstants.PermissionTemplateNames.EDIT_DOCUMENT, user.getPrincipalId())) { |
60 | 0 | documentActions.remove(KRADConstants.KUALI_ACTION_CAN_EDIT); |
61 | |
} |
62 | |
|
63 | 0 | if (documentActions.contains(KRADConstants.KUALI_ACTION_CAN_COPY) |
64 | |
&& !isAuthorizedByTemplate(document, KRADConstants.KRAD_NAMESPACE, |
65 | |
KimConstants.PermissionTemplateNames.COPY_DOCUMENT, user.getPrincipalId())) { |
66 | 0 | documentActions.remove(KRADConstants.KUALI_ACTION_CAN_COPY); |
67 | |
} |
68 | |
|
69 | 0 | if (documentActions.contains(KRADConstants.KUALI_ACTION_CAN_BLANKET_APPROVE) |
70 | |
&& !isAuthorizedByTemplate(document, KRADConstants.KUALI_RICE_WORKFLOW_NAMESPACE, |
71 | |
KimConstants.PermissionTemplateNames.BLANKET_APPROVE_DOCUMENT, user.getPrincipalId())) { |
72 | 0 | documentActions.remove(KRADConstants.KUALI_ACTION_CAN_BLANKET_APPROVE); |
73 | |
} |
74 | |
|
75 | 0 | if (documentActions.contains(KRADConstants.KUALI_ACTION_CAN_CANCEL) |
76 | |
&& !isAuthorizedByTemplate(document, KRADConstants.KUALI_RICE_WORKFLOW_NAMESPACE, |
77 | |
KimConstants.PermissionTemplateNames.CANCEL_DOCUMENT, user.getPrincipalId())) { |
78 | 0 | documentActions.remove(KRADConstants.KUALI_ACTION_CAN_CANCEL); |
79 | |
} |
80 | |
|
81 | 0 | if (documentActions.contains(KRADConstants.KUALI_ACTION_CAN_SAVE) |
82 | |
&& !isAuthorizedByTemplate(document, KRADConstants.KUALI_RICE_WORKFLOW_NAMESPACE, |
83 | |
KimConstants.PermissionTemplateNames.SAVE_DOCUMENT, user.getPrincipalId())) { |
84 | 0 | documentActions.remove(KRADConstants.KUALI_ACTION_CAN_SAVE); |
85 | |
} |
86 | |
|
87 | 0 | if (documentActions.contains(KRADConstants.KUALI_ACTION_CAN_ROUTE) |
88 | |
&& !isAuthorizedByTemplate(document, KRADConstants.KUALI_RICE_WORKFLOW_NAMESPACE, |
89 | |
KimConstants.PermissionTemplateNames.ROUTE_DOCUMENT, user.getPrincipalId())) { |
90 | 0 | documentActions.remove(KRADConstants.KUALI_ACTION_CAN_ROUTE); |
91 | |
} |
92 | |
|
93 | 0 | if (documentActions.contains(KRADConstants.KUALI_ACTION_CAN_ACKNOWLEDGE) |
94 | |
&& !canTakeRequestedAction(document, KEWConstants.ACTION_REQUEST_ACKNOWLEDGE_REQ, user)) { |
95 | 0 | documentActions.remove(KRADConstants.KUALI_ACTION_CAN_ACKNOWLEDGE); |
96 | |
} |
97 | |
|
98 | 0 | if (documentActions.contains(KRADConstants.KUALI_ACTION_CAN_FYI) |
99 | |
&& !canTakeRequestedAction(document, KEWConstants.ACTION_REQUEST_FYI_REQ, user)) { |
100 | 0 | documentActions.remove(KRADConstants.KUALI_ACTION_CAN_FYI); |
101 | |
} |
102 | |
|
103 | 0 | if (documentActions.contains(KRADConstants.KUALI_ACTION_CAN_APPROVE) |
104 | |
|| documentActions.contains(KRADConstants.KUALI_ACTION_CAN_DISAPPROVE)) { |
105 | 0 | if (!canTakeRequestedAction(document, KEWConstants.ACTION_REQUEST_APPROVE_REQ, user)) { |
106 | 0 | documentActions.remove(KRADConstants.KUALI_ACTION_CAN_APPROVE); |
107 | 0 | documentActions.remove(KRADConstants.KUALI_ACTION_CAN_DISAPPROVE); |
108 | |
} |
109 | |
} |
110 | |
|
111 | 0 | if (!canSendAnyTypeAdHocRequests(document, user)) { |
112 | 0 | documentActions.remove(KRADConstants.KUALI_ACTION_CAN_ADD_ADHOC_REQUESTS); |
113 | 0 | documentActions.remove(KRADConstants.KUALI_ACTION_CAN_SEND_ADHOC_REQUESTS); |
114 | 0 | documentActions.remove(KRADConstants.KUALI_ACTION_CAN_SEND_NOTE_FYI); |
115 | |
} |
116 | |
|
117 | 0 | if (documentActions.contains(KRADConstants.KUALI_ACTION_CAN_SEND_NOTE_FYI) |
118 | |
&& !canSendAdHocRequests(document, KEWConstants.ACTION_REQUEST_FYI_REQ, user)) { |
119 | 0 | documentActions.remove(KRADConstants.KUALI_ACTION_CAN_SEND_NOTE_FYI); |
120 | |
} |
121 | |
|
122 | 0 | if (documentActions.contains(KRADConstants.KUALI_ACTION_CAN_ANNOTATE) |
123 | |
&& !documentActions.contains(KRADConstants.KUALI_ACTION_CAN_EDIT)) { |
124 | 0 | documentActions.remove(KRADConstants.KUALI_ACTION_CAN_ANNOTATE); |
125 | |
} |
126 | |
|
127 | 0 | if (documentActions.contains(KRADConstants.KUALI_ACTION_CAN_EDIT__DOCUMENT_OVERVIEW) |
128 | |
&& !canEditDocumentOverview(document, user)) { |
129 | 0 | documentActions.remove(KRADConstants.KUALI_ACTION_CAN_EDIT__DOCUMENT_OVERVIEW); |
130 | |
} |
131 | |
|
132 | 0 | return documentActions; |
133 | |
} |
134 | |
|
135 | |
public final boolean canInitiate(String documentTypeName, Person user) { |
136 | 0 | String nameSpaceCode = KRADConstants.KUALI_RICE_SYSTEM_NAMESPACE; |
137 | 0 | Map<String, String> permissionDetails = new HashMap<String, String>(); |
138 | 0 | permissionDetails.put(KimConstants.AttributeConstants.DOCUMENT_TYPE_NAME, |
139 | |
documentTypeName); |
140 | 0 | return getPermissionService().isAuthorizedByTemplateName( |
141 | |
user.getPrincipalId(), nameSpaceCode, |
142 | |
KimConstants.PermissionTemplateNames.INITIATE_DOCUMENT, |
143 | |
permissionDetails, null); |
144 | |
} |
145 | |
|
146 | |
public final boolean canReceiveAdHoc(Document document, Person user, |
147 | |
String actionRequestCode) { |
148 | 0 | Map<String,String> additionalPermissionDetails = new HashMap<String, String>(); |
149 | 0 | additionalPermissionDetails.put(KimConstants.AttributeConstants.ACTION_REQUEST_CD, actionRequestCode); |
150 | 0 | return isAuthorizedByTemplate(document, |
151 | |
KRADConstants.KUALI_RICE_WORKFLOW_NAMESPACE, |
152 | |
KimConstants.PermissionTemplateNames.AD_HOC_REVIEW_DOCUMENT, |
153 | |
user.getPrincipalId(), additionalPermissionDetails, null ); |
154 | |
} |
155 | |
|
156 | |
public final boolean canOpen(Document document, Person user) { |
157 | 0 | return isAuthorizedByTemplate(document, KRADConstants.KRAD_NAMESPACE, |
158 | |
KimConstants.PermissionTemplateNames.OPEN_DOCUMENT, user |
159 | |
.getPrincipalId()); |
160 | |
} |
161 | |
|
162 | |
public final boolean canAddNoteAttachment(Document document, |
163 | |
String attachmentTypeCode, Person user) { |
164 | 0 | Map<String, String> additionalPermissionDetails = new HashMap<String, String>(); |
165 | 0 | if (attachmentTypeCode != null) { |
166 | 0 | additionalPermissionDetails.put(KimConstants.AttributeConstants.ATTACHMENT_TYPE_CODE, |
167 | |
attachmentTypeCode); |
168 | |
} |
169 | 0 | return isAuthorizedByTemplate(document, KRADConstants.KRAD_NAMESPACE, |
170 | |
KimConstants.PermissionTemplateNames.ADD_NOTE_ATTACHMENT, user |
171 | |
.getPrincipalId(), additionalPermissionDetails, null); |
172 | |
} |
173 | |
|
174 | |
public final boolean canDeleteNoteAttachment(Document document, |
175 | |
String attachmentTypeCode, String createdBySelfOnly, Person user) { |
176 | 0 | Map<String, String> additionalPermissionDetails = new HashMap<String, String>(); |
177 | 0 | if (attachmentTypeCode != null) { |
178 | 0 | additionalPermissionDetails.put(KimConstants.AttributeConstants.ATTACHMENT_TYPE_CODE, |
179 | |
attachmentTypeCode); |
180 | |
} |
181 | 0 | additionalPermissionDetails.put(KimConstants.AttributeConstants.CREATED_BY_SELF, |
182 | |
createdBySelfOnly); |
183 | 0 | return isAuthorizedByTemplate(document, KRADConstants.KRAD_NAMESPACE, |
184 | |
KimConstants.PermissionTemplateNames.DELETE_NOTE_ATTACHMENT, |
185 | |
user.getPrincipalId(), additionalPermissionDetails, null); |
186 | |
} |
187 | |
|
188 | |
public final boolean canViewNoteAttachment(Document document, |
189 | |
String attachmentTypeCode, Person user) { |
190 | 0 | Map<String, String> additionalPermissionDetails = new HashMap<String, String>(); |
191 | 0 | if (attachmentTypeCode != null) { |
192 | 0 | additionalPermissionDetails.put(KimConstants.AttributeConstants.ATTACHMENT_TYPE_CODE, |
193 | |
attachmentTypeCode); |
194 | |
} |
195 | 0 | return isAuthorizedByTemplate(document, KRADConstants.KRAD_NAMESPACE, |
196 | |
KimConstants.PermissionTemplateNames.VIEW_NOTE_ATTACHMENT, user |
197 | |
.getPrincipalId(), additionalPermissionDetails, null); |
198 | |
} |
199 | |
|
200 | |
public final boolean canSendAdHocRequests(Document document, |
201 | |
String actionRequestCd, Person user) { |
202 | 0 | Map<String, String> additionalPermissionDetails = new HashMap<String, String>(); |
203 | 0 | if (actionRequestCd != null) { |
204 | 0 | additionalPermissionDetails.put(KimConstants.AttributeConstants.ACTION_REQUEST_CD, |
205 | |
actionRequestCd); |
206 | |
} |
207 | 0 | return isAuthorizedByTemplate(document, KRADConstants.KRAD_NAMESPACE, |
208 | |
KimConstants.PermissionTemplateNames.SEND_AD_HOC_REQUEST, user |
209 | |
.getPrincipalId(), additionalPermissionDetails, null); |
210 | |
} |
211 | |
|
212 | |
public boolean canEditDocumentOverview(Document document, Person user){ |
213 | 0 | return isAuthorizedByTemplate(document, |
214 | |
KRADConstants.KRAD_NAMESPACE, |
215 | |
KimConstants.PermissionTemplateNames.EDIT_DOCUMENT, |
216 | |
user.getPrincipalId()) && this.isDocumentInitiator(document, user); |
217 | |
} |
218 | |
|
219 | |
protected final boolean canSendAnyTypeAdHocRequests(Document document, Person user) { |
220 | 0 | if (canSendAdHocRequests(document, KEWConstants.ACTION_REQUEST_FYI_REQ, user)) { |
221 | 0 | RoutePath routePath = KewApiServiceLocator.getDocumentTypeService().getRoutePathForDocumentTypeName(document.getDocumentHeader().getWorkflowDocument().getDocumentTypeName()); |
222 | 0 | Process process = routePath.getPrimaryProcess(); |
223 | 0 | if (process != null) { |
224 | 0 | if (process.getInitialRouteNode() == null) { |
225 | 0 | return false; |
226 | |
} |
227 | |
} else { |
228 | 0 | return false; |
229 | |
} |
230 | 0 | return true; |
231 | 0 | } else if(canSendAdHocRequests(document, KEWConstants.ACTION_REQUEST_ACKNOWLEDGE_REQ, user)){ |
232 | 0 | return true; |
233 | |
} |
234 | 0 | return canSendAdHocRequests(document, KEWConstants.ACTION_REQUEST_APPROVE_REQ, user); |
235 | |
} |
236 | |
|
237 | |
protected boolean canTakeRequestedAction(Document document, |
238 | |
String actionRequestCode, Person user) { |
239 | 0 | Map<String, String> additionalPermissionDetails = new HashMap<String, String>(); |
240 | 0 | additionalPermissionDetails.put(KimConstants.AttributeConstants.ACTION_REQUEST_CD, |
241 | |
actionRequestCode); |
242 | 0 | return isAuthorizedByTemplate(document, KRADConstants.KRAD_NAMESPACE, |
243 | |
KimConstants.PermissionTemplateNames.TAKE_REQUESTED_ACTION, |
244 | |
user.getPrincipalId(), additionalPermissionDetails, null); |
245 | |
} |
246 | |
|
247 | |
@Override |
248 | |
protected void addPermissionDetails(Object dataObject, |
249 | |
Map<String, String> attributes) { |
250 | 0 | super.addPermissionDetails(dataObject, attributes); |
251 | 0 | if (dataObject instanceof Document) { |
252 | 0 | addStandardAttributes((Document) dataObject, attributes); |
253 | |
} |
254 | 0 | } |
255 | |
|
256 | |
@Override |
257 | |
protected void addRoleQualification(Object dataObject, |
258 | |
Map<String, String> attributes) { |
259 | 0 | super.addRoleQualification(dataObject, attributes); |
260 | 0 | if (dataObject instanceof Document) { |
261 | 0 | addStandardAttributes((Document) dataObject, attributes); |
262 | |
} |
263 | 0 | } |
264 | |
|
265 | |
protected void addStandardAttributes(Document document, |
266 | |
Map<String, String> attributes) { |
267 | 0 | WorkflowDocument wd = document.getDocumentHeader() |
268 | |
.getWorkflowDocument(); |
269 | 0 | attributes.put(KimConstants.AttributeConstants.DOCUMENT_NUMBER, document |
270 | |
.getDocumentNumber()); |
271 | 0 | attributes.put(KimConstants.AttributeConstants.DOCUMENT_TYPE_NAME, wd.getDocumentTypeName()); |
272 | 0 | if (wd.isInitiated() || wd.isSaved()) { |
273 | 0 | attributes.put(KimConstants.AttributeConstants.ROUTE_NODE_NAME, |
274 | |
PRE_ROUTING_ROUTE_NAME); |
275 | |
} else { |
276 | 0 | attributes.put(KimConstants.AttributeConstants.ROUTE_NODE_NAME, KRADServiceLocatorWeb.getWorkflowDocumentService().getCurrentRouteNodeNames(wd)); |
277 | |
} |
278 | 0 | attributes.put(KimConstants.AttributeConstants.ROUTE_STATUS_CODE, wd.getStatus().getCode()); |
279 | 0 | } |
280 | |
|
281 | |
protected boolean isDocumentInitiator(Document document, Person user) { |
282 | 0 | WorkflowDocument workflowDocument = document.getDocumentHeader().getWorkflowDocument(); |
283 | 0 | return workflowDocument.getInitiatorPrincipalId().equalsIgnoreCase(user.getPrincipalId()); |
284 | |
} |
285 | |
|
286 | |
} |