Coverage Report - org.kuali.rice.kim.document.rule.IdentityManagementRoleDocumentRule
 
Classes in this File Line Coverage Branch Coverage Complexity
IdentityManagementRoleDocumentRule
0%
0/298
0%
0/228
4.256
 
 1  
 /*
 2  
  * Copyright 2007-2009 The Kuali Foundation
 3  
  *
 4  
  * Licensed under the Educational Community License, Version 2.0 (the "License");
 5  
  * you may not use this file except in compliance with the License.
 6  
  * You may obtain a copy of the License at
 7  
  *
 8  
  * http://www.opensource.org/licenses/ecl2.php
 9  
  *
 10  
  * Unless required by applicable law or agreed to in writing, software
 11  
  * distributed under the License is distributed on an "AS IS" BASIS,
 12  
  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 13  
  * See the License for the specific language governing permissions and
 14  
  * limitations under the License.
 15  
  */
 16  
 package org.kuali.rice.kim.document.rule;
 17  
 
 18  
 import org.apache.commons.lang.StringUtils;
 19  
 import org.kuali.rice.core.util.RiceKeyConstants;
 20  
 import org.kuali.rice.kim.api.permission.Permission;
 21  
 import org.kuali.rice.kim.api.responsibility.Responsibility;
 22  
 import org.kuali.rice.kim.api.responsibility.ResponsibilityService;
 23  
 import org.kuali.rice.kim.api.role.Role;
 24  
 import org.kuali.rice.kim.api.role.RoleService;
 25  
 import org.kuali.rice.kim.api.services.IdentityService;
 26  
 import org.kuali.rice.kim.api.services.KimApiServiceLocator;
 27  
 import org.kuali.rice.kim.api.type.KimType;
 28  
 import org.kuali.rice.kim.api.type.KimTypeService;
 29  
 import org.kuali.rice.kim.bo.types.dto.AttributeDefinitionMap;
 30  
 import org.kuali.rice.kim.bo.ui.KimDocumentRoleMember;
 31  
 import org.kuali.rice.kim.bo.ui.KimDocumentRolePermission;
 32  
 import org.kuali.rice.kim.bo.ui.KimDocumentRoleQualifier;
 33  
 import org.kuali.rice.kim.bo.ui.KimDocumentRoleResponsibility;
 34  
 import org.kuali.rice.kim.bo.ui.KimDocumentRoleResponsibilityAction;
 35  
 import org.kuali.rice.kim.bo.ui.RoleDocumentDelegationMember;
 36  
 import org.kuali.rice.kim.bo.ui.RoleDocumentDelegationMemberQualifier;
 37  
 import org.kuali.rice.kim.document.IdentityManagementRoleDocument;
 38  
 import org.kuali.rice.kim.framework.role.RoleEbo;
 39  
 import org.kuali.rice.kim.impl.responsibility.AddResponsibilityEvent;
 40  
 import org.kuali.rice.kim.impl.responsibility.AddResponsibilityRule;
 41  
 import org.kuali.rice.kim.impl.responsibility.KimDocumentResponsibilityRule;
 42  
 import org.kuali.rice.kim.impl.responsibility.ResponsibilityBo;
 43  
 import org.kuali.rice.kim.impl.responsibility.ResponsibilityInternalService;
 44  
 import org.kuali.rice.kim.impl.role.RoleBo;
 45  
 import org.kuali.rice.kim.impl.role.RoleServiceBase;
 46  
 import org.kuali.rice.kim.impl.type.KimTypeLookupableHelperServiceImpl;
 47  
 import org.kuali.rice.kim.rule.event.ui.AddDelegationEvent;
 48  
 import org.kuali.rice.kim.rule.event.ui.AddDelegationMemberEvent;
 49  
 import org.kuali.rice.kim.rule.event.ui.AddMemberEvent;
 50  
 import org.kuali.rice.kim.rule.event.ui.AddPermissionEvent;
 51  
 import org.kuali.rice.kim.rule.ui.AddDelegationMemberRule;
 52  
 import org.kuali.rice.kim.rule.ui.AddDelegationRule;
 53  
 import org.kuali.rice.kim.rule.ui.AddMemberRule;
 54  
 import org.kuali.rice.kim.rule.ui.AddPermissionRule;
 55  
 import org.kuali.rice.kim.rules.ui.KimDocumentMemberRule;
 56  
 import org.kuali.rice.kim.rules.ui.KimDocumentPermissionRule;
 57  
 import org.kuali.rice.kim.rules.ui.RoleDocumentDelegationMemberRule;
 58  
 import org.kuali.rice.kim.rules.ui.RoleDocumentDelegationRule;
 59  
 import org.kuali.rice.kim.service.KIMServiceLocatorWeb;
 60  
 import org.kuali.rice.kim.util.KimConstants;
 61  
 import org.kuali.rice.krad.datadictionary.AttributeDefinition;
 62  
 import org.kuali.rice.krad.document.Document;
 63  
 import org.kuali.rice.krad.rules.TransactionalDocumentRuleBase;
 64  
 import org.kuali.rice.krad.service.BusinessObjectService;
 65  
 import org.kuali.rice.krad.service.KRADServiceLocator;
 66  
 import org.kuali.rice.krad.util.GlobalVariables;
 67  
 import org.kuali.rice.krad.util.KRADConstants;
 68  
 import org.kuali.rice.krad.util.MessageMap;
 69  
 
 70  
 import java.sql.Timestamp;
 71  
 import java.util.Collections;
 72  
 import java.util.HashMap;
 73  
 import java.util.HashSet;
 74  
 import java.util.List;
 75  
 import java.util.Map;
 76  
 import java.util.Set;
 77  
 
 78  
 /**
 79  
  * @author Kuali Rice Team (rice.collab@kuali.org)
 80  
  */
 81  0
 public class IdentityManagementRoleDocumentRule extends TransactionalDocumentRuleBase implements AddPermissionRule, AddResponsibilityRule, AddMemberRule, AddDelegationRule, AddDelegationMemberRule {
 82  
 //        protected static final Logger LOG = Logger.getLogger( IdentityManagementRoleDocumentRule.class );
 83  
 
 84  
     public static final int PRIORITY_NUMBER_MIN_VALUE = 1;
 85  
     public static final int PRIORITY_NUMBER_MAX_VALUE = 11;
 86  
 
 87  
         protected AddResponsibilityRule addResponsibilityRule;
 88  
         protected AddPermissionRule  addPermissionRule;
 89  
         protected AddMemberRule  addMemberRule;
 90  
         protected AddDelegationRule addDelegationRule;
 91  
         protected AddDelegationMemberRule addDelegationMemberRule;
 92  
         protected BusinessObjectService businessObjectService;
 93  
         protected ResponsibilityService responsibilityService;
 94  0
         protected Class<? extends AddResponsibilityRule> addResponsibilityRuleClass = KimDocumentResponsibilityRule.class;
 95  0
         protected Class<? extends AddPermissionRule> addPermissionRuleClass = KimDocumentPermissionRule.class;
 96  0
         protected Class<? extends AddMemberRule> addMemberRuleClass = KimDocumentMemberRule.class;
 97  0
         protected Class<? extends AddDelegationRule> addDelegationRuleClass = RoleDocumentDelegationRule.class;
 98  0
         protected Class<? extends AddDelegationMemberRule> addDelegationMemberRuleClass = RoleDocumentDelegationMemberRule.class;
 99  
 
 100  
         protected IdentityService identityService;
 101  
         private static ResponsibilityInternalService responsibilityInternalService;
 102  
 
 103  0
         protected AttributeValidationHelper attributeValidationHelper = new AttributeValidationHelper();
 104  
 
 105  
         // KULRICE-4153
 106  0
         protected ActiveRoleMemberHelper activeRoleMemberHelper = new ActiveRoleMemberHelper();
 107  
 
 108  
     public IdentityService getIdentityService() {
 109  0
         if ( identityService == null) {
 110  0
             identityService = KimApiServiceLocator.getIdentityService();
 111  
         }
 112  0
         return identityService;
 113  
     }
 114  
 
 115  
     @Override
 116  
     protected boolean processCustomSaveDocumentBusinessRules(Document document) {
 117  0
         if (!(document instanceof IdentityManagementRoleDocument)) {
 118  0
             return false;
 119  
         }
 120  
 
 121  0
         IdentityManagementRoleDocument roleDoc = (IdentityManagementRoleDocument)document;
 122  
 
 123  0
         boolean valid = true;
 124  0
         boolean validateRoleAssigneesAndDelegations = !KimTypeLookupableHelperServiceImpl
 125  
                 .hasDerivedRoleTypeService(roleDoc.getKimType());
 126  0
         GlobalVariables.getMessageMap().addToErrorPath(KRADConstants.DOCUMENT_PROPERTY_NAME);
 127  0
         valid &= validDuplicateRoleName(roleDoc);
 128  0
         valid &= validPermissions(roleDoc);
 129  0
         valid &= validResponsibilities(roleDoc);
 130  0
         getDictionaryValidationService().validateDocumentAndUpdatableReferencesRecursively(document, getMaxDictionaryValidationDepth(), true, false);
 131  0
         validateRoleAssigneesAndDelegations &= validAssignRole(roleDoc);
 132  0
         if(validateRoleAssigneesAndDelegations){
 133  
                 //valid &= validAssignRole(roleDoc);
 134  
                 // KULRICE-4153 & KULRICE-4818
 135  
                 // Use the Active Role Member Helper to retrieve only those Role Members & Delegation member that are active
 136  
                 // If a member or delegation is active on a Role, and they have an inactive Role Qualifier, Role Qualifier validation will fail
 137  
                 // If a member or delegation is inactive on a Role, and they have an inactive Role Qualifier, Role Qualifier validation will pass
 138  0
                 List<KimDocumentRoleMember> activeRoleMembers = activeRoleMemberHelper.getActiveRoleMembers(roleDoc.getMembers());
 139  0
                 List<RoleDocumentDelegationMember> activeRoleDelegationMembers = activeRoleMemberHelper.getActiveDelegationRoleMembers(roleDoc.getDelegationMembers());
 140  
 
 141  0
                 valid &= validateRoleQualifier(activeRoleMembers, roleDoc.getKimType());
 142  0
                 valid &= validRoleMemberActiveDates(roleDoc.getMembers());
 143  0
                 valid &= validateDelegationMemberRoleQualifier(activeRoleMembers, activeRoleDelegationMembers, roleDoc.getKimType());
 144  0
                 valid &= validDelegationMemberActiveDates(roleDoc.getDelegationMembers());
 145  0
                 valid &= validRoleMembersResponsibilityActions(roleDoc.getMembers());
 146  
         }
 147  0
         valid &= validRoleResponsibilitiesActions(roleDoc.getResponsibilities());
 148  0
         GlobalVariables.getMessageMap().removeFromErrorPath(KRADConstants.DOCUMENT_PROPERTY_NAME);
 149  
 
 150  0
         return valid;
 151  
     }
 152  
 
 153  
         protected boolean validAssignRole(IdentityManagementRoleDocument document){
 154  0
         boolean rulePassed = true;
 155  0
         Map<String,String> additionalPermissionDetails = new HashMap<String,String>();
 156  0
         additionalPermissionDetails.put(KimConstants.AttributeConstants.NAMESPACE_CODE, document.getRoleNamespace());
 157  0
         additionalPermissionDetails.put(KimConstants.AttributeConstants.ROLE_NAME, document.getRoleName());
 158  0
                 if((document.getMembers()!=null && document.getMembers().size()>0) ||
 159  
                                 (document.getDelegationMembers()!=null && document.getDelegationMembers().size()>0)){
 160  0
                         if(!getDocumentHelperService().getDocumentAuthorizer(document).isAuthorizedByTemplate(
 161  
                                         document, KimConstants.NAMESPACE_CODE, KimConstants.PermissionTemplateNames.ASSIGN_ROLE,
 162  
                                         GlobalVariables.getUserSession().getPrincipalId(), additionalPermissionDetails, null)){
 163  0
                     rulePassed = false;
 164  
                         }
 165  
                 }
 166  0
                 return rulePassed;
 167  
         }
 168  
 
 169  
     @SuppressWarnings("unchecked")
 170  
         protected boolean validDuplicateRoleName(IdentityManagementRoleDocument roleDoc){
 171  0
         Role role = KimApiServiceLocator.getRoleService().getRoleByName(roleDoc.getRoleNamespace(), roleDoc.getRoleName());
 172  0
             boolean rulePassed = true;
 173  0
             if(role!=null){
 174  0
                     if(role.getId().equals(roleDoc.getRoleId())) {
 175  0
                 rulePassed = true;
 176  
             }
 177  
                     else{
 178  0
                             GlobalVariables.getMessageMap().putError("document.roleName",
 179  
                                             RiceKeyConstants.ERROR_DUPLICATE_ENTRY, new String[] {"Role Name"});
 180  0
                             rulePassed = false;
 181  
                     }
 182  
             }
 183  0
             return rulePassed;
 184  
     }
 185  
 
 186  
     protected boolean validRoleMemberActiveDates(List<KimDocumentRoleMember> roleMembers) {
 187  0
             boolean valid = true;
 188  0
                 int i = 0;
 189  0
             for(KimDocumentRoleMember roleMember: roleMembers) {
 190  0
                            valid &= validateActiveDate("document.members["+i+"].activeToDate", roleMember.getActiveFromDate(), roleMember.getActiveToDate());
 191  0
                     i++;
 192  
             }
 193  0
             return valid;
 194  
     }
 195  
 
 196  
     protected boolean validDelegationMemberActiveDates(List<RoleDocumentDelegationMember> delegationMembers) {
 197  0
             boolean valid = true;
 198  0
                 int i = 0;
 199  0
             for(RoleDocumentDelegationMember delegationMember: delegationMembers) {
 200  0
                            valid &= validateActiveDate("document.delegationMembers[" + i + "].activeToDate",
 201  
                        delegationMember.getActiveFromDate(), delegationMember.getActiveToDate());
 202  0
                     i++;
 203  
             }
 204  0
             return valid;
 205  
     }
 206  
 
 207  
     protected boolean validPermissions(IdentityManagementRoleDocument document){
 208  
             Permission kimPermissionInfo;
 209  0
             boolean valid = true;
 210  0
             int i = 0;
 211  0
             for(KimDocumentRolePermission permission: document.getPermissions()){
 212  0
                     kimPermissionInfo = permission.getPermission();
 213  0
                     if(!permission.isActive() && !hasPermissionToGrantPermission(permission.getPermission(), document)){
 214  0
                     GlobalVariables.getMessageMap().putError("permissions["+i+"].active", RiceKeyConstants.ERROR_ASSIGN_PERMISSION,
 215  
                                     new String[] {kimPermissionInfo.getNamespaceCode(), kimPermissionInfo.getTemplate().getName()});
 216  0
                     valid = false;
 217  
                     }
 218  0
                     i++;
 219  
             }
 220  0
             return valid;
 221  
     }
 222  
 
 223  
     protected boolean validResponsibilities(IdentityManagementRoleDocument document){
 224  
             ResponsibilityBo kimResponsibilityImpl;
 225  0
             boolean valid = true;
 226  0
             int i = 0;
 227  0
             for(KimDocumentRoleResponsibility responsibility: document.getResponsibilities()){
 228  0
                     kimResponsibilityImpl = responsibility.getKimResponsibility();
 229  0
                     if(!responsibility.isActive() && !hasPermissionToGrantResponsibility(ResponsibilityBo.to(responsibility.getKimResponsibility()), document)){
 230  0
                     GlobalVariables.getMessageMap().putError("responsibilities["+i+"].active", RiceKeyConstants.ERROR_ASSIGN_RESPONSIBILITY,
 231  
                                     new String[] {kimResponsibilityImpl.getNamespaceCode(), kimResponsibilityImpl.getTemplate().getName()});
 232  0
                     valid = false;
 233  
                     }
 234  0
                     i++;
 235  
             }
 236  0
             return valid;
 237  
     }
 238  
 
 239  
     protected boolean validRoleResponsibilitiesActions(List<KimDocumentRoleResponsibility> roleResponsibilities){
 240  0
         int i = 0;
 241  0
         boolean rulePassed = true;
 242  0
             for(KimDocumentRoleResponsibility roleResponsibility: roleResponsibilities){
 243  0
                     if(!getResponsibilityInternalService().areActionsAtAssignmentLevelById(roleResponsibility.getResponsibilityId())) {
 244  0
                             validateRoleResponsibilityAction("document.responsibilities["+i+"].roleRspActions[0].priorityNumber", roleResponsibility.getRoleRspActions().get(0));
 245  
             }
 246  0
                 i++;
 247  
             }
 248  0
             return rulePassed;
 249  
     }
 250  
 
 251  
     protected boolean validRoleMembersResponsibilityActions(List<KimDocumentRoleMember> roleMembers){
 252  0
         int i = 0;
 253  
         int j;
 254  0
         boolean rulePassed = true;
 255  0
             for(KimDocumentRoleMember roleMember: roleMembers){
 256  0
                     j = 0;
 257  0
                     if(roleMember.getRoleRspActions()!=null && !roleMember.getRoleRspActions().isEmpty()){
 258  0
                             for(KimDocumentRoleResponsibilityAction roleRspAction: roleMember.getRoleRspActions()){
 259  0
                                     validateRoleResponsibilityAction("document.members["+i+"].roleRspActions["+j+"].priorityNumber", roleRspAction);
 260  0
                                 j++;
 261  
                             }
 262  
                     }
 263  0
                     i++;
 264  
             }
 265  0
             return rulePassed;
 266  
     }
 267  
 
 268  
     protected boolean validateRoleResponsibilityAction(String errorPath, KimDocumentRoleResponsibilityAction roleRspAction){
 269  0
             boolean rulePassed = true;
 270  
             /*if(StringUtils.isBlank(roleRspAction.getActionPolicyCode())){
 271  
                     GlobalVariables.getErrorMap().putError(errorPath,
 272  
                                     RiceKeyConstants.ERROR_EMPTY_ENTRY, new String[] {"Action Policy Code"});
 273  
                     rulePassed = false;
 274  
             }
 275  
             if(roleRspAction.getPriorityNumber()==null){
 276  
                     GlobalVariables.getErrorMap().putError(errorPath,
 277  
                                     RiceKeyConstants.ERROR_EMPTY_ENTRY, new String[] {"Priority Number"});
 278  
                     rulePassed = false;
 279  
             }
 280  
             if(StringUtils.isBlank(roleRspAction.getActionTypeCode())){
 281  
                     GlobalVariables.getErrorMap().putError(errorPath,
 282  
                                     RiceKeyConstants.ERROR_EMPTY_ENTRY, new String[] {"Action Type Code"});
 283  
                     rulePassed = false;
 284  
             }*/
 285  0
             if(roleRspAction.getPriorityNumber()!=null &&
 286  
                             (roleRspAction.getPriorityNumber()<PRIORITY_NUMBER_MIN_VALUE
 287  
                                             || roleRspAction.getPriorityNumber()>PRIORITY_NUMBER_MAX_VALUE)){
 288  0
                     GlobalVariables.getMessageMap().putError(errorPath,
 289  
                                    RiceKeyConstants.ERROR_PRIORITY_NUMBER_RANGE, new String[] {PRIORITY_NUMBER_MIN_VALUE+"", PRIORITY_NUMBER_MAX_VALUE+""});
 290  0
                     rulePassed = false;
 291  
             }
 292  
 
 293  0
             return rulePassed;
 294  
     }
 295  
 
 296  
     protected boolean validateRoleQualifier(List<KimDocumentRoleMember> roleMembers, KimType kimType){
 297  0
                 Map<String, String> validationErrors = new HashMap<String, String>();
 298  
 
 299  0
                 int memberCounter = 0;
 300  0
                 int roleMemberCount = 0;
 301  
                 Map<String, String> errorsTemp;
 302  
                 Map<String, String> mapToValidate;
 303  0
         KimTypeService kimTypeService = KIMServiceLocatorWeb.getKimTypeService(kimType);
 304  0
         GlobalVariables.getMessageMap().removeFromErrorPath(KRADConstants.DOCUMENT_PROPERTY_NAME);
 305  0
         final AttributeDefinitionMap attributeDefinitions = kimTypeService.getAttributeDefinitions(kimType.getId());
 306  0
         final Set<String> uniqueAttributeNames = figureOutUniqueQualificationSet(roleMembers, attributeDefinitions);
 307  
 
 308  0
                 for(KimDocumentRoleMember roleMember: roleMembers) {
 309  0
                         errorsTemp = Collections.emptyMap();
 310  0
                         mapToValidate = attributeValidationHelper.convertQualifiersToMap(roleMember.getQualifiers());
 311  0
                         if(!roleMember.isRole()){
 312  0
                                 errorsTemp = kimTypeService.validateAttributes(kimType.getId(), mapToValidate);
 313  0
                                 validationErrors.putAll( 
 314  
                                                 attributeValidationHelper.convertErrorsForMappedFields(
 315  
                                 "document.members[" + memberCounter + "]", errorsTemp));
 316  0
                         memberCounter++;
 317  
                         }
 318  0
                         if (uniqueAttributeNames.size() > 0) {
 319  0
                                 validateUniquePersonRoleQualifiersUniqueForRoleMembership(roleMember, roleMemberCount, roleMembers, uniqueAttributeNames, validationErrors);
 320  
                         }
 321  
 
 322  0
                         roleMemberCount += 1;
 323  
             }
 324  
 
 325  0
                 GlobalVariables.getMessageMap().addToErrorPath(KRADConstants.DOCUMENT_PROPERTY_NAME);
 326  
 
 327  0
             if (validationErrors.isEmpty()) {
 328  0
                     return true;
 329  
             } 
 330  0
             attributeValidationHelper.moveValidationErrorsToErrorMap(validationErrors);
 331  0
             return false;
 332  
     }
 333  
 
 334  
     /**
 335  
      * Finds the names of the unique qualification attributes which this role should be checking against
 336  
      *
 337  
      * @param memberships the memberships (we take the qualification from the first)
 338  
      * @param attributeDefinitions information about the attributeDefinitions
 339  
      * @return a Set of unique attribute ids (with their indices, for error reporting)
 340  
      */
 341  
     protected Set<String> figureOutUniqueQualificationSet(List<KimDocumentRoleMember> memberships, AttributeDefinitionMap attributeDefinitions) {
 342  0
             Set<String> uniqueAttributeIds = new HashSet<String>();
 343  
 
 344  0
             if (memberships != null && memberships.size() > 1) { // if there aren't two or more members, doing this whole check is kinda silly
 345  0
                     KimDocumentRoleMember membership = memberships.get(0);
 346  
 
 347  0
                     for (KimDocumentRoleQualifier qualifier : membership.getQualifiers()) {
 348  0
                         if (qualifier != null && qualifier.getKimAttribute() != null && !StringUtils.isBlank(qualifier.getKimAttribute().getAttributeName())) {
 349  0
                                 final AttributeDefinition relatedDefinition = attributeDefinitions.getByAttributeName(qualifier.getKimAttribute().getAttributeName());
 350  
 
 351  0
                                 if (relatedDefinition != null && relatedDefinition.getUnique() != null && relatedDefinition.getUnique().booleanValue()) {
 352  0
                                         uniqueAttributeIds.add(qualifier.getKimAttrDefnId()); // it's unique - add it to the Set
 353  
                                 }
 354  0
                         }
 355  
                     }
 356  
             }
 357  
 
 358  0
             return uniqueAttributeIds;
 359  
     }
 360  
 
 361  
     /**
 362  
      * Checks all the qualifiers for the given membership, so that all qualifiers which should be unique are guaranteed to be unique
 363  
      *
 364  
      * @param membershipToCheck the membership to check
 365  
      * @param membershipToCheckIndex the index of the person's membership in the role (for error reporting purposes)
 366  
      * @param validationErrors Map<String, String> of errors to report
 367  
      * @return true if all unique values are indeed unique, false otherwise
 368  
      */
 369  
     protected boolean validateUniquePersonRoleQualifiersUniqueForRoleMembership(KimDocumentRoleMember membershipToCheck, int membershipToCheckIndex, List<KimDocumentRoleMember> memberships, Set<String> uniqueQualifierIds, Map<String, String> validationErrors) {
 370  0
             boolean foundError = false;
 371  0
             int count = 0;
 372  
 
 373  0
             for (KimDocumentRoleMember membership : memberships) {
 374  0
                     if (membershipToCheckIndex != count) {
 375  0
                             if (sameMembership(membershipToCheck, membership)) {
 376  0
                                     if (sameUniqueMembershipQualifications(membershipToCheck, membership, uniqueQualifierIds)) {
 377  0
                                             foundError = true;
 378  
                                             // add error to each qualifier which is supposed to be unique
 379  0
                                             int qualifierCount = 0;
 380  
 
 381  0
                                             for (KimDocumentRoleQualifier qualifier : membership.getQualifiers()) {
 382  0
                                                     if (qualifier != null && uniqueQualifierIds.contains(qualifier.getKimAttrDefnId())) {
 383  0
                                                             validationErrors.put("document.members["+membershipToCheckIndex+"].qualifiers["+qualifierCount+"].attrVal", RiceKeyConstants.ERROR_DOCUMENT_IDENTITY_MANAGEMENT_PERSON_QUALIFIER_VALUE_NOT_UNIQUE+":"+qualifier.getKimAttribute().getAttributeName()+";"+qualifier.getAttrVal());
 384  
                                                     }
 385  0
                                                     qualifierCount += 1;
 386  
                                             }
 387  
                                     }
 388  
                             }
 389  
                     }
 390  0
                     count += 1;
 391  
             }
 392  
 
 393  0
             return foundError;
 394  
     }
 395  
 
 396  
     /**
 397  
      * Determines if two memberships represent the same member being added: that is, the two memberships have the same type code and id
 398  
      *
 399  
      * @param membershipA the first membership to check
 400  
      * @param membershipB the second membership to check
 401  
      * @return true if the two memberships represent the same member; false if they do not, or if it could not be profitably determined if the members were the same
 402  
      */
 403  
     protected boolean sameMembership(KimDocumentRoleMember membershipA, KimDocumentRoleMember membershipB) {
 404  0
             if (!StringUtils.isBlank(membershipA.getMemberTypeCode()) && !StringUtils.isBlank(membershipB.getMemberTypeCode()) && !StringUtils.isBlank(membershipA.getMemberId()) && !StringUtils.isBlank(membershipB.getMemberId())) {
 405  0
                     return membershipA.getMemberTypeCode().equals(membershipB.getMemberTypeCode()) && membershipA.getMemberId().equals(membershipB.getMemberId());
 406  
             }
 407  0
             return false;
 408  
     }
 409  
 
 410  
     /**
 411  
      * Given two memberships which represent the same member, do they share qualifications?
 412  
      *
 413  
      * @param membershipA the first membership to check
 414  
      * @param membershipB the second membership to check
 415  
      * @param uniqueAttributeIds the Set of attribute definition ids which should be unique
 416  
      * @return
 417  
      */
 418  
     protected boolean sameUniqueMembershipQualifications(KimDocumentRoleMember membershipA, KimDocumentRoleMember membershipB, Set<String> uniqueAttributeIds) {
 419  0
             boolean equalSoFar = true;
 420  0
             for (String kimAttributeDefinitionId : uniqueAttributeIds) {
 421  0
                     final KimDocumentRoleQualifier qualifierA = membershipA.getQualifier(kimAttributeDefinitionId);
 422  0
                     final KimDocumentRoleQualifier qualifierB = membershipB.getQualifier(kimAttributeDefinitionId);
 423  
 
 424  0
                     if (qualifierA != null && qualifierB != null) {
 425  0
                             equalSoFar &= (qualifierA.getAttrVal() == null && qualifierB.getAttrVal() == null) || (qualifierA.getAttrVal() == null || qualifierA.getAttrVal().equals(qualifierB.getAttrVal()));
 426  
                     }
 427  0
             }
 428  0
             return equalSoFar;
 429  
     }
 430  
 
 431  
     protected KimDocumentRoleMember getRoleMemberForDelegation(
 432  
                     List<KimDocumentRoleMember> roleMembers, RoleDocumentDelegationMember delegationMember){
 433  0
             if(roleMembers==null || delegationMember==null || delegationMember.getRoleMemberId()==null) { return null; }
 434  0
             for(KimDocumentRoleMember roleMember: roleMembers){
 435  0
                     if(delegationMember.getRoleMemberId().equals(roleMember.getRoleMemberId())) {
 436  0
                 return roleMember;
 437  
             }
 438  
             }
 439  0
             return null;
 440  
     }
 441  
 
 442  
     protected boolean validateDelegationMemberRoleQualifier(List<KimDocumentRoleMember> roleMembers,
 443  
                     List<RoleDocumentDelegationMember> delegationMembers, KimType kimType){
 444  0
                 Map<String, String> validationErrors = new HashMap<String, String>();
 445  
                 boolean valid;
 446  0
                 int memberCounter = 0;
 447  
                 Map<String, String> errorsTemp;
 448  
                 Map<String, String> mapToValidate;
 449  0
         KimTypeService kimTypeService = KIMServiceLocatorWeb.getKimTypeService(kimType);
 450  0
         GlobalVariables.getMessageMap().removeFromErrorPath(KRADConstants.DOCUMENT_PROPERTY_NAME);
 451  
         KimDocumentRoleMember roleMember;
 452  
         String errorPath;
 453  0
         final AttributeDefinitionMap attributeDefinitions = kimTypeService.getAttributeDefinitions(kimType.getId());
 454  0
         final Set<String> uniqueQualifierAttributes = figureOutUniqueQualificationSetForDelegation(delegationMembers, attributeDefinitions);
 455  
 
 456  0
                 for(RoleDocumentDelegationMember delegationMember: delegationMembers) {
 457  0
                         errorPath = "delegationMembers["+memberCounter+"]";
 458  0
                         mapToValidate = attributeValidationHelper.convertQualifiersToMap(delegationMember.getQualifiers());
 459  0
                         if(!delegationMember.isRole()){
 460  0
                                 errorsTemp = kimTypeService.validateAttributes(kimType.getId(), mapToValidate);
 461  0
                                 validationErrors.putAll(
 462  
                                                 attributeValidationHelper.convertErrorsForMappedFields(errorPath, errorsTemp));
 463  
                         }
 464  0
                         roleMember = getRoleMemberForDelegation(roleMembers, delegationMember);
 465  0
                         if(roleMember==null){
 466  0
                                 valid = false;
 467  0
                                 GlobalVariables.getMessageMap().putError("document.delegationMembers["+memberCounter+"]", RiceKeyConstants.ERROR_DELEGATE_ROLE_MEMBER_ASSOCIATION, new String[]{});
 468  
                         } else{
 469  0
                                 errorsTemp = kimTypeService.validateUnmodifiableAttributes(
 470  
                                                                 kimType.getId(),
 471  
                                                                 attributeValidationHelper.convertQualifiersToMap(roleMember.getQualifiers()),
 472  
                                                                 mapToValidate);
 473  0
                                 validationErrors.putAll(
 474  
                                                 attributeValidationHelper.convertErrorsForMappedFields(errorPath, errorsTemp) );
 475  
                         }
 476  0
                         if (uniqueQualifierAttributes.size() > 0) {
 477  0
                                 validateUniquePersonRoleQualifiersUniqueForRoleDelegation(delegationMember, memberCounter, delegationMembers, uniqueQualifierAttributes, validationErrors);
 478  
                         }
 479  0
                 memberCounter++;
 480  
             }
 481  0
                 GlobalVariables.getMessageMap().addToErrorPath(KRADConstants.DOCUMENT_PROPERTY_NAME);
 482  0
             if (validationErrors.isEmpty()) {
 483  0
                     valid = true;
 484  
             } else {
 485  0
                     attributeValidationHelper.moveValidationErrorsToErrorMap(validationErrors);
 486  0
                     valid = false;
 487  
             }
 488  0
             return valid;
 489  
     }
 490  
 
 491  
     /**
 492  
      * Finds the names of the unique qualification attributes which this role should be checking against
 493  
      *
 494  
      * @param memberships the memberships (we take the qualification from the first)
 495  
      * @param attributeDefinitions information about the attributeDefinitions
 496  
      * @return a Set of unique attribute ids (with their indices, for error reporting)
 497  
      */
 498  
     protected Set<String> figureOutUniqueQualificationSetForDelegation(List<RoleDocumentDelegationMember> memberships, AttributeDefinitionMap attributeDefinitions) {
 499  0
             Set<String> uniqueAttributeIds = new HashSet<String>();
 500  
 
 501  0
             if (memberships != null && memberships.size() > 1) { // if there aren't two or more members, doing this whole check is kinda silly
 502  0
                     RoleDocumentDelegationMember membership = memberships.get(0);
 503  
 
 504  0
                     for (RoleDocumentDelegationMemberQualifier qualifier : membership.getQualifiers()) {
 505  0
                         if (qualifier != null && qualifier.getKimAttribute() != null && !StringUtils.isBlank(qualifier.getKimAttribute().getAttributeName())) {
 506  0
                                 final AttributeDefinition relatedDefinition = attributeDefinitions.getByAttributeName(qualifier.getKimAttribute().getAttributeName());
 507  
 
 508  0
                                 if (relatedDefinition.getUnique() != null && relatedDefinition.getUnique().booleanValue()) {
 509  0
                                         uniqueAttributeIds.add(qualifier.getKimAttrDefnId()); // it's unique - add it to the Set
 510  
                                 }
 511  0
                         }
 512  
                     }
 513  
             }
 514  
 
 515  0
             return uniqueAttributeIds;
 516  
     }
 517  
 
 518  
     /**
 519  
      * Checks all the qualifiers for the given membership, so that all qualifiers which should be unique are guaranteed to be unique
 520  
      *
 521  
      * @param delegationMembershipToCheck the membership to check
 522  
      * @param membershipToCheckIndex the index of the person's membership in the role (for error reporting purposes)
 523  
      * @param validationErrors Map<String, String> of errors to report
 524  
      * @return true if all unique values are indeed unique, false otherwise
 525  
      */
 526  
     protected boolean validateUniquePersonRoleQualifiersUniqueForRoleDelegation(RoleDocumentDelegationMember delegationMembershipToCheck, int membershipToCheckIndex, List<RoleDocumentDelegationMember> delegationMemberships, Set<String> uniqueQualifierIds, Map<String, String> validationErrors) {
 527  0
             boolean foundError = false;
 528  0
             int count = 0;
 529  
 
 530  0
             for (RoleDocumentDelegationMember delegationMembership : delegationMemberships) {
 531  0
                     if (membershipToCheckIndex != count) {
 532  0
                             if (sameDelegationMembership(delegationMembershipToCheck, delegationMembership)) {
 533  0
                                     if (sameUniqueDelegationMembershipQualifications(delegationMembershipToCheck, delegationMembership, uniqueQualifierIds)) {
 534  0
                                             foundError = true;
 535  
                                             // add error to each qualifier which is supposed to be unique
 536  0
                                             int qualifierCount = 0;
 537  
 
 538  0
                                             for (RoleDocumentDelegationMemberQualifier qualifier : delegationMembership.getQualifiers()) {
 539  0
                                                     if (qualifier != null && uniqueQualifierIds.contains(qualifier.getKimAttrDefnId())) {
 540  0
                                                             validationErrors.put("document.delegationMembers["+membershipToCheckIndex+"].qualifiers["+qualifierCount+"].attrVal", RiceKeyConstants.ERROR_DOCUMENT_IDENTITY_MANAGEMENT_PERSON_QUALIFIER_VALUE_NOT_UNIQUE+":"+qualifier.getKimAttribute().getAttributeName()+";"+qualifier.getAttrVal());
 541  
                                                     }
 542  0
                                                     qualifierCount += 1;
 543  
                                             }
 544  
                                     }
 545  
                             }
 546  
                     }
 547  0
                     count += 1;
 548  
             }
 549  
 
 550  0
             return foundError;
 551  
     }
 552  
 
 553  
     /**
 554  
      * Determines if two memberships represent the same member being added: that is, the two memberships have the same type code and id
 555  
      *
 556  
      * @param membershipA the first membership to check
 557  
      * @param membershipB the second membership to check
 558  
      * @return true if the two memberships represent the same member; false if they do not, or if it could not be profitably determined if the members were the same
 559  
      */
 560  
     protected boolean sameDelegationMembership(RoleDocumentDelegationMember membershipA, RoleDocumentDelegationMember membershipB) {
 561  0
             if (!StringUtils.isBlank(membershipA.getMemberTypeCode()) && !StringUtils.isBlank(membershipB.getMemberTypeCode()) && !StringUtils.isBlank(membershipA.getMemberId()) && !StringUtils.isBlank(membershipB.getMemberId())) {
 562  0
                     return membershipA.getMemberTypeCode().equals(membershipB.getMemberTypeCode()) && membershipA.getMemberId().equals(membershipB.getMemberId());
 563  
             }
 564  0
             return false;
 565  
     }
 566  
 
 567  
     /**
 568  
      * Given two memberships which represent the same member, do they share qualifications?
 569  
      *
 570  
      * @param membershipA the first membership to check
 571  
      * @param membershipB the second membership to check
 572  
      * @param uniqueAttributeIds the Set of attribute definition ids which should be unique
 573  
      * @return
 574  
      */
 575  
     protected boolean sameUniqueDelegationMembershipQualifications(RoleDocumentDelegationMember membershipA, RoleDocumentDelegationMember membershipB, Set<String> uniqueAttributeIds) {
 576  0
             boolean equalSoFar = true;
 577  0
             for (String kimAttributeDefinitionId : uniqueAttributeIds) {
 578  0
                     final RoleDocumentDelegationMemberQualifier qualifierA = membershipA.getQualifier(kimAttributeDefinitionId);
 579  0
                     final RoleDocumentDelegationMemberQualifier qualifierB = membershipB.getQualifier(kimAttributeDefinitionId);
 580  
 
 581  0
                     if (qualifierA != null && qualifierB != null) {
 582  0
                             equalSoFar &= (qualifierA.getAttrVal() == null && qualifierB.getAttrVal() == null) || (qualifierA.getAttrVal() == null || qualifierA.getAttrVal().equals(qualifierB.getAttrVal()));
 583  
                     }
 584  0
             }
 585  0
             return equalSoFar;
 586  
     }
 587  
 
 588  
         protected boolean validateActiveDate(String errorPath, Timestamp activeFromDate, Timestamp activeToDate) {
 589  
                 // TODO : do not have detail bus rule yet, so just check this for now.
 590  0
                 boolean valid = true;
 591  0
                 if (activeFromDate != null && activeToDate !=null && activeToDate.before(activeFromDate)) {
 592  0
                 MessageMap errorMap = GlobalVariables.getMessageMap();
 593  0
             errorMap.putError(errorPath, RiceKeyConstants.ERROR_ACTIVE_TO_DATE_BEFORE_FROM_DATE);
 594  0
             valid = false;
 595  
 
 596  
                 }
 597  0
                 return valid;
 598  
         }
 599  
 
 600  
         /**
 601  
          *
 602  
          * This method checks to see if adding a role to role membership
 603  
          * creates a circular reference.
 604  
          *
 605  
          * @param addMemberEvent
 606  
          * @return true  - ok to assign, no circular references
 607  
          *         false - do not make assignment, will create circular reference.
 608  
          */
 609  
         protected boolean checkForCircularRoleMembership(AddMemberEvent addMemberEvent)
 610  
         {
 611  0
                 KimDocumentRoleMember newMember = addMemberEvent.getMember();
 612  0
                 if (newMember == null || StringUtils.isBlank(newMember.getMemberId())){
 613  0
                         MessageMap errorMap = GlobalVariables.getMessageMap();
 614  0
                         errorMap.putError("member.memberId", RiceKeyConstants.ERROR_INVALID_ROLE, new String[] {""});
 615  0
                         return false;
 616  
                 }
 617  0
                 Set<String> roleMemberIds = null;
 618  
                 // if the role member is a role, check to make sure we won't be creating a circular reference.
 619  
                 // Verify that the new role is not already related to the role either directly or indirectly
 620  0
                 if (newMember.isRole()){
 621  
                         // get all nested role member ids that are of type role
 622  0
                         RoleService roleService = KimApiServiceLocator.getRoleService();
 623  0
                         roleMemberIds = ((RoleServiceBase) roleService).getRoleTypeRoleMemberIds(newMember.getMemberId());
 624  
 
 625  
                         // check to see if the document role is not a member of the new member role
 626  0
                         IdentityManagementRoleDocument document = (IdentityManagementRoleDocument)addMemberEvent.getDocument();
 627  0
                         if (roleMemberIds.contains(document.getRoleId())){
 628  0
                                 MessageMap errorMap = GlobalVariables.getMessageMap();
 629  0
                                 errorMap.putError("member.memberId", RiceKeyConstants.ERROR_ASSIGN_ROLE_MEMBER_CIRCULAR, new String[] {newMember.getMemberId()});
 630  0
                                 return false;
 631  
                         }
 632  
                 }
 633  0
                 return true;
 634  
         }
 635  
 
 636  
         /**
 637  
          * @return the addResponsibilityRule
 638  
          */
 639  
         public AddResponsibilityRule getAddResponsibilityRule() {
 640  0
                 if(addResponsibilityRule == null){
 641  
                         try {
 642  0
                                 addResponsibilityRule = addResponsibilityRuleClass.newInstance();
 643  0
                         } catch ( Exception ex ) {
 644  0
                                 throw new RuntimeException( "Unable to create AddResponsibilityRule instance using class: " + addResponsibilityRuleClass, ex );
 645  0
                         }
 646  
                 }
 647  0
                 return addResponsibilityRule;
 648  
         }
 649  
 
 650  
         /**
 651  
          * @return the addPermissionRule
 652  
          */
 653  
         public AddPermissionRule getAddPermissionRule() {
 654  0
                 if(addPermissionRule == null){
 655  
                         try {
 656  0
                                 addPermissionRule = addPermissionRuleClass.newInstance();
 657  0
                         } catch ( Exception ex ) {
 658  0
                                 throw new RuntimeException( "Unable to create AddPermissionRule instance using class: " + addPermissionRuleClass, ex );
 659  0
                         }
 660  
                 }
 661  0
                 return addPermissionRule;
 662  
         }
 663  
 
 664  
         /**
 665  
          * @return the addMemberRule
 666  
          */
 667  
         public AddMemberRule getAddMemberRule() {
 668  0
                 if(addMemberRule == null){
 669  
                         try {
 670  0
                                 addMemberRule = addMemberRuleClass.newInstance();
 671  0
                         } catch ( Exception ex ) {
 672  0
                                 throw new RuntimeException( "Unable to create AddMemberRule instance using class: " + addMemberRuleClass, ex );
 673  0
                         }
 674  
                 }
 675  0
                 return addMemberRule;
 676  
         }
 677  
 
 678  
         /**
 679  
          * @return the addDelegationRule
 680  
          */
 681  
         public AddDelegationRule getAddDelegationRule() {
 682  0
                 if(addDelegationRule == null){
 683  
                         try {
 684  0
                                 addDelegationRule = addDelegationRuleClass.newInstance();
 685  0
                         } catch ( Exception ex ) {
 686  0
                                 throw new RuntimeException( "Unable to create AddDelegationRule instance using class: " + addDelegationRuleClass, ex );
 687  0
                         }
 688  
                 }
 689  0
                 return addDelegationRule;
 690  
         }
 691  
 
 692  
         /**
 693  
          * @return the addDelegationMemberRule
 694  
          */
 695  
         public AddDelegationMemberRule getAddDelegationMemberRule() {
 696  0
                 if(addDelegationMemberRule == null){
 697  
                         try {
 698  0
                                 addDelegationMemberRule = addDelegationMemberRuleClass.newInstance();
 699  0
                         } catch ( Exception ex ) {
 700  0
                                 throw new RuntimeException( "Unable to create AddDelegationMemberRule instance using class: " + addDelegationMemberRuleClass, ex );
 701  0
                         }
 702  
                 }
 703  0
                 return addDelegationMemberRule;
 704  
         }
 705  
 
 706  
     public boolean processAddPermission(AddPermissionEvent addPermissionEvent) {
 707  0
         return getAddPermissionRule().processAddPermission(addPermissionEvent);
 708  
     }
 709  
 
 710  
     public boolean hasPermissionToGrantPermission(Permission kimPermissionInfo , IdentityManagementRoleDocument document){
 711  0
         return getAddPermissionRule().hasPermissionToGrantPermission(kimPermissionInfo, document);
 712  
     }
 713  
 
 714  
     public boolean processAddResponsibility(AddResponsibilityEvent addResponsibilityEvent) {
 715  0
         return getAddResponsibilityRule().processAddResponsibility(addResponsibilityEvent);
 716  
     }
 717  
 
 718  
     public boolean hasPermissionToGrantResponsibility(Responsibility kimResponsibilityInfo, IdentityManagementRoleDocument document) {
 719  0
         return getAddResponsibilityRule().hasPermissionToGrantResponsibility(kimResponsibilityInfo, document);
 720  
     }
 721  
 
 722  
     public boolean processAddMember(AddMemberEvent addMemberEvent) {
 723  0
         boolean success = new KimDocumentMemberRule().processAddMember(addMemberEvent);
 724  0
         success &= validateActiveDate("member.activeFromDate", addMemberEvent.getMember().getActiveFromDate(), addMemberEvent.getMember().getActiveToDate());
 725  0
         success &= checkForCircularRoleMembership(addMemberEvent);
 726  0
         return success;
 727  
     }
 728  
 
 729  
     public boolean processAddDelegation(AddDelegationEvent addDelegationEvent) {
 730  0
         return getAddDelegationRule().processAddDelegation(addDelegationEvent);
 731  
     }
 732  
 
 733  
     public boolean processAddDelegationMember(AddDelegationMemberEvent addDelegationMemberEvent) {
 734  0
         boolean success = new RoleDocumentDelegationMemberRule().processAddDelegationMember(addDelegationMemberEvent);
 735  0
         RoleDocumentDelegationMember roleDocumentDelegationMember = addDelegationMemberEvent.getDelegationMember();
 736  0
         success &= validateActiveDate("delegationMember.activeFromDate", roleDocumentDelegationMember.getActiveFromDate(), roleDocumentDelegationMember.getActiveToDate());
 737  0
         return success;
 738  
     }
 739  
 
 740  
         public ResponsibilityService getResponsibilityService() {
 741  0
                 if(responsibilityService == null){
 742  0
                         responsibilityService = KimApiServiceLocator.getResponsibilityService();
 743  
                 }
 744  0
                 return responsibilityService;
 745  
         }
 746  
 
 747  
     public ResponsibilityInternalService getResponsibilityInternalService() {
 748  0
             if ( responsibilityInternalService == null ) {
 749  0
                     responsibilityInternalService = org.kuali.rice.kim.impl.services.KIMServiceLocatorInternal.getResponsibilityInternalService();
 750  
             }
 751  0
                 return responsibilityInternalService;
 752  
         }
 753  
 
 754  
 
 755  
         /**
 756  
          * @return the businessObjectService
 757  
          */
 758  
         public BusinessObjectService getBusinessObjectService() {
 759  0
                 if(businessObjectService == null){
 760  0
                         businessObjectService = KRADServiceLocator.getBusinessObjectService();
 761  
                 }
 762  0
                 return businessObjectService;
 763  
         }
 764  
 }