1 | |
|
2 | |
|
3 | |
|
4 | |
|
5 | |
|
6 | |
|
7 | |
|
8 | |
|
9 | |
|
10 | |
|
11 | |
|
12 | |
|
13 | |
|
14 | |
|
15 | |
|
16 | |
package org.kuali.rice.kew.doctype; |
17 | |
|
18 | |
import java.io.BufferedReader; |
19 | |
import java.io.IOException; |
20 | |
import java.io.Serializable; |
21 | |
import java.io.StringReader; |
22 | |
import java.util.ArrayList; |
23 | |
import java.util.List; |
24 | |
|
25 | |
import javax.xml.parsers.DocumentBuilderFactory; |
26 | |
import javax.xml.parsers.ParserConfigurationException; |
27 | |
import javax.xml.xpath.XPath; |
28 | |
import javax.xml.xpath.XPathConstants; |
29 | |
|
30 | |
import org.apache.commons.lang.StringUtils; |
31 | |
import org.kuali.rice.core.api.impex.xml.XmlConstants; |
32 | |
import org.kuali.rice.core.util.ConcreteKeyValue; |
33 | |
import org.kuali.rice.core.util.KeyValue; |
34 | |
import org.kuali.rice.kew.exception.WorkflowException; |
35 | |
import org.kuali.rice.kew.exception.WorkflowRuntimeException; |
36 | |
import org.kuali.rice.kew.rule.bo.RuleAttribute; |
37 | |
import org.kuali.rice.kew.rule.xmlrouting.XPathHelper; |
38 | |
import org.kuali.rice.kew.service.KEWServiceLocator; |
39 | |
import org.kuali.rice.kew.util.Utilities; |
40 | |
import org.kuali.rice.kim.api.services.KimApiServiceLocator; |
41 | |
import org.kuali.rice.kim.api.group.Group; |
42 | |
import org.w3c.dom.Element; |
43 | |
import org.w3c.dom.NamedNodeMap; |
44 | |
import org.w3c.dom.Node; |
45 | |
import org.w3c.dom.NodeList; |
46 | |
import org.xml.sax.InputSource; |
47 | |
import org.xml.sax.SAXException; |
48 | |
|
49 | |
|
50 | |
public class DocumentTypeSecurity implements Serializable { |
51 | |
|
52 | |
private static final long serialVersionUID = -1886779857180381404L; |
53 | |
|
54 | 0 | private static final org.apache.log4j.Logger LOG = org.apache.log4j.Logger.getLogger(DocumentTypeSecurity.class); |
55 | |
|
56 | |
private Boolean active; |
57 | |
|
58 | |
private Boolean initiatorOk; |
59 | |
private Boolean routeLogAuthenticatedOk; |
60 | 0 | private List<KeyValue> searchableAttributes = new ArrayList<KeyValue>(); |
61 | 0 | private List<Group> workgroups = new ArrayList<Group>(); |
62 | 0 | private List<SecurityPermissionInfo> permissions = new ArrayList<SecurityPermissionInfo>(); |
63 | 0 | private List<String> allowedRoles = new ArrayList<String>(); |
64 | 0 | private List<String> disallowedRoles = new ArrayList<String>(); |
65 | 0 | private List<SecurityAttribute> securityAttributes = new ArrayList<SecurityAttribute>(); |
66 | |
|
67 | 0 | private static XPath xpath = XPathHelper.newXPath(); |
68 | |
|
69 | 0 | public DocumentTypeSecurity() {} |
70 | |
|
71 | |
|
72 | |
|
73 | |
|
74 | |
|
75 | |
public DocumentTypeSecurity(String standardApplicationId, String documentTypeSecurityXml) |
76 | 0 | { |
77 | |
try { |
78 | 0 | if (org.apache.commons.lang.StringUtils.isEmpty(documentTypeSecurityXml)) { |
79 | 0 | return; |
80 | |
} |
81 | |
|
82 | 0 | InputSource inputSource = new InputSource(new BufferedReader(new StringReader(documentTypeSecurityXml))); |
83 | 0 | Element securityElement = DocumentBuilderFactory.newInstance().newDocumentBuilder().parse(inputSource).getDocumentElement(); |
84 | |
|
85 | 0 | String active = (String) xpath.evaluate("./@active", securityElement, XPathConstants.STRING); |
86 | 0 | if (org.apache.commons.lang.StringUtils.isEmpty(active) || "true".equals(active.toLowerCase())) { |
87 | |
|
88 | 0 | this.setActive(Boolean.valueOf(true)); |
89 | |
} |
90 | |
else { |
91 | 0 | this.setActive(Boolean.valueOf(false)); |
92 | |
} |
93 | |
|
94 | |
|
95 | 0 | NodeList initiatorNodes = (NodeList) xpath.evaluate("./initiator", securityElement, XPathConstants.NODESET); |
96 | 0 | if (initiatorNodes != null && initiatorNodes.getLength()>0) { |
97 | 0 | Node initiatorNode = initiatorNodes.item(0); |
98 | 0 | String value = initiatorNode.getTextContent(); |
99 | 0 | if (org.apache.commons.lang.StringUtils.isEmpty(value) || value.toLowerCase().equals("true")) { |
100 | 0 | this.setInitiatorOk(Boolean.valueOf(true)); |
101 | |
} |
102 | |
else { |
103 | 0 | this.initiatorOk = Boolean.valueOf(false); |
104 | |
} |
105 | |
} |
106 | |
|
107 | |
|
108 | 0 | NodeList routeLogAuthNodes = (NodeList) xpath.evaluate("./routeLogAuthenticated", securityElement, XPathConstants.NODESET); |
109 | 0 | if (routeLogAuthNodes != null && routeLogAuthNodes.getLength()>0) { |
110 | 0 | Node routeLogAuthNode = routeLogAuthNodes.item(0); |
111 | 0 | String value = routeLogAuthNode.getTextContent(); |
112 | 0 | if (org.apache.commons.lang.StringUtils.isEmpty(value) || value.toLowerCase().equals("true")) { |
113 | 0 | this.routeLogAuthenticatedOk = Boolean.valueOf(true); |
114 | |
} |
115 | |
else { |
116 | 0 | this.routeLogAuthenticatedOk = Boolean.valueOf(false); |
117 | |
} |
118 | |
} |
119 | |
|
120 | 0 | NodeList searchableAttributeNodes = (NodeList) xpath.evaluate("./searchableAttribute", securityElement, XPathConstants.NODESET); |
121 | 0 | if (searchableAttributeNodes != null && searchableAttributeNodes.getLength()>0) { |
122 | 0 | for (int i = 0; i < searchableAttributeNodes.getLength(); i++) { |
123 | 0 | Node searchableAttributeNode = searchableAttributeNodes.item(i); |
124 | 0 | String name = (String) xpath.evaluate("./@name", searchableAttributeNode, XPathConstants.STRING); |
125 | 0 | String idType = (String) xpath.evaluate("./@idType", searchableAttributeNode, XPathConstants.STRING); |
126 | 0 | if (!org.apache.commons.lang.StringUtils.isEmpty(name) && !org.apache.commons.lang.StringUtils.isEmpty(idType)) { |
127 | 0 | KeyValue searchableAttribute = new ConcreteKeyValue(name, idType); |
128 | 0 | searchableAttributes.add(searchableAttribute); |
129 | |
} |
130 | |
} |
131 | |
} |
132 | |
|
133 | 0 | NodeList workgroupNodes = (NodeList) xpath.evaluate("./workgroup", securityElement, XPathConstants.NODESET); |
134 | 0 | if (workgroupNodes != null && workgroupNodes.getLength()>0) { |
135 | 0 | LOG.warn("Document Type Security XML is using deprecated element 'workgroup', please use 'groupName' instead."); |
136 | 0 | for (int i = 0; i < workgroupNodes.getLength(); i++) { |
137 | 0 | Node workgroupNode = workgroupNodes.item(i); |
138 | 0 | String value = workgroupNode.getTextContent().trim(); |
139 | 0 | if (!org.apache.commons.lang.StringUtils.isEmpty(value)) { |
140 | 0 | value = Utilities.substituteConfigParameters(value); |
141 | 0 | String namespaceCode = Utilities.parseGroupNamespaceCode(value); |
142 | 0 | String groupName = Utilities.parseGroupName(value); |
143 | 0 | Group groupObject = KimApiServiceLocator.getIdentityManagementService().getGroupByName(namespaceCode, groupName); |
144 | 0 | if (groupObject == null) { |
145 | 0 | throw new WorkflowException("Could not find group: " + value); |
146 | |
} |
147 | 0 | workgroups.add(groupObject); |
148 | |
} |
149 | |
} |
150 | |
} |
151 | |
|
152 | 0 | NodeList groupNodes = (NodeList) xpath.evaluate("./groupName", securityElement, XPathConstants.NODESET); |
153 | 0 | if (groupNodes != null && groupNodes.getLength()>0) { |
154 | 0 | for (int i = 0; i < groupNodes.getLength(); i++) { |
155 | 0 | Node groupNode = groupNodes.item(i); |
156 | 0 | if (groupNode.getNodeType() == Node.ELEMENT_NODE) { |
157 | 0 | String groupName = groupNode.getTextContent().trim(); |
158 | 0 | if (!org.apache.commons.lang.StringUtils.isEmpty(groupName)) { |
159 | 0 | groupName = Utilities.substituteConfigParameters(groupName).trim(); |
160 | 0 | String namespaceCode = Utilities.substituteConfigParameters(((Element) groupNode).getAttribute(XmlConstants.NAMESPACE)).trim(); |
161 | 0 | Group groupObject = KimApiServiceLocator.getIdentityManagementService().getGroupByName(namespaceCode, groupName); |
162 | |
|
163 | |
|
164 | 0 | if (groupObject != null) { |
165 | 0 | workgroups.add(groupObject); |
166 | |
} else { |
167 | 0 | LOG.warn("Could not find group with name '" + groupName + "' and namespace '" + namespaceCode + "' which was defined on Document Type security"); |
168 | |
} |
169 | |
|
170 | |
|
171 | |
|
172 | |
|
173 | |
|
174 | |
} |
175 | |
} |
176 | |
} |
177 | |
} |
178 | |
|
179 | 0 | NodeList permissionNodes = (NodeList) xpath.evaluate("./permission", securityElement, XPathConstants.NODESET); |
180 | 0 | if (permissionNodes != null && permissionNodes.getLength()>0) { |
181 | 0 | for (int i = 0; i < permissionNodes.getLength(); i++) { |
182 | 0 | Node permissionNode = permissionNodes.item(i); |
183 | 0 | if (permissionNode.getNodeType() == Node.ELEMENT_NODE) { |
184 | 0 | SecurityPermissionInfo securityPermission = new SecurityPermissionInfo(); |
185 | 0 | securityPermission.setPermissionName(Utilities.substituteConfigParameters(((Element) permissionNode).getAttribute(XmlConstants.NAME)).trim()); |
186 | 0 | securityPermission.setPermissionNamespaceCode(Utilities.substituteConfigParameters(((Element) permissionNode).getAttribute(XmlConstants.NAMESPACE)).trim()); |
187 | 0 | if (!StringUtils.isEmpty(securityPermission.getPermissionName()) && !StringUtils.isEmpty(securityPermission.getPermissionNamespaceCode())) { |
188 | |
|
189 | 0 | if (permissionNode.hasChildNodes()) { |
190 | 0 | NodeList permissionChildNodes = permissionNode.getChildNodes(); |
191 | 0 | for (int j = 0; j <permissionChildNodes.getLength(); j++) { |
192 | 0 | Node permissionChildNode = permissionChildNodes.item(j); |
193 | 0 | if (permissionChildNode.getNodeType() == Node.ELEMENT_NODE) { |
194 | 0 | String childAttributeName = Utilities.substituteConfigParameters(((Element) permissionChildNode).getAttribute(XmlConstants.NAME)).trim(); |
195 | 0 | String childAttributeValue = permissionChildNode.getTextContent().trim(); |
196 | 0 | if (!StringUtils.isEmpty(childAttributeValue)) { |
197 | 0 | childAttributeValue = Utilities.substituteConfigParameters(childAttributeValue).trim(); |
198 | |
} |
199 | 0 | if (!StringUtils.isEmpty(childAttributeValue)) { |
200 | 0 | childAttributeValue = Utilities.substituteConfigParameters(childAttributeValue).trim(); |
201 | |
} |
202 | 0 | if (permissionChildNode.getNodeName().trim().equals("permissionDetail")) { |
203 | 0 | securityPermission.getPermissionDetails().put(childAttributeName, childAttributeValue); |
204 | |
} |
205 | 0 | if (permissionChildNode.getNodeName().trim().equals("qualification")) { |
206 | 0 | securityPermission.getQualifications().put(childAttributeName, childAttributeValue); |
207 | |
} |
208 | |
} |
209 | |
} |
210 | |
} |
211 | |
|
212 | 0 | if ( KimApiServiceLocator.getPermissionService().isPermissionDefined(securityPermission.getPermissionNamespaceCode(), securityPermission.getPermissionName(), securityPermission.getPermissionDetails())) { |
213 | 0 | permissions.add(securityPermission); |
214 | |
} else { |
215 | 0 | LOG.warn("Could not find permission with name '" + securityPermission.getPermissionName() + "' and namespace '" + securityPermission.getPermissionNamespaceCode() + "' which was defined on Document Type security"); |
216 | |
} |
217 | |
} |
218 | |
} |
219 | |
} |
220 | |
} |
221 | |
|
222 | 0 | NodeList roleNodes = (NodeList) xpath.evaluate("./role", securityElement, XPathConstants.NODESET); |
223 | 0 | if (roleNodes != null && roleNodes.getLength()>0) { |
224 | 0 | for (int i = 0; i < roleNodes.getLength(); i++) { |
225 | 0 | Element roleElement = (Element)roleNodes.item(i); |
226 | 0 | String value = roleElement.getTextContent().trim(); |
227 | 0 | String allowedValue = roleElement.getAttribute("allowed"); |
228 | 0 | if (StringUtils.isBlank(allowedValue)) { |
229 | 0 | allowedValue = "true"; |
230 | |
} |
231 | 0 | if (!org.apache.commons.lang.StringUtils.isEmpty(value)) { |
232 | 0 | if (Boolean.parseBoolean(allowedValue)) { |
233 | 0 | allowedRoles.add(value); |
234 | |
} else { |
235 | 0 | disallowedRoles.add(value); |
236 | |
} |
237 | |
} |
238 | |
} |
239 | |
} |
240 | |
|
241 | 0 | NodeList attributeNodes = (NodeList) xpath.evaluate("./securityAttribute", securityElement, XPathConstants.NODESET); |
242 | 0 | if (attributeNodes != null && attributeNodes.getLength()>0) { |
243 | 0 | for (int i = 0; i < attributeNodes.getLength(); i++) { |
244 | 0 | Element attributeElement = (Element)attributeNodes.item(i); |
245 | 0 | NamedNodeMap elemAttributes = attributeElement.getAttributes(); |
246 | 0 | String className = null; |
247 | 0 | String applicationId = standardApplicationId; |
248 | 0 | if (elemAttributes.getNamedItem("name") != null) { |
249 | |
|
250 | 0 | String ruleAttributeName = elemAttributes.getNamedItem("name").getNodeValue().trim(); |
251 | 0 | RuleAttribute ruleAttribute = KEWServiceLocator.getRuleAttributeService().findByName(ruleAttributeName); |
252 | 0 | if (ruleAttribute == null) { |
253 | 0 | throw new WorkflowException("Could not find rule attribute: " + ruleAttributeName); |
254 | |
} |
255 | 0 | applicationId = ruleAttribute.getApplicationId(); |
256 | 0 | className = ruleAttribute.getClassName(); |
257 | 0 | } else if (elemAttributes.getNamedItem("class") != null) { |
258 | |
|
259 | 0 | className = elemAttributes.getNamedItem("class").getNodeValue().trim(); |
260 | |
} else { |
261 | 0 | throw new WorkflowException("Cannot find attribute 'name' or attribute 'class' for securityAttribute Node"); |
262 | |
} |
263 | |
|
264 | 0 | this.securityAttributes.add(new LazyLoadSecurityAttribute(className, applicationId)); |
265 | |
|
266 | |
} |
267 | |
} |
268 | 0 | } catch (Exception err) { |
269 | 0 | throw new WorkflowRuntimeException(err); |
270 | 0 | } |
271 | 0 | } |
272 | |
|
273 | |
public List<SecurityAttribute> getSecurityAttributes() { |
274 | 0 | return this.securityAttributes; |
275 | |
} |
276 | |
|
277 | |
public void setSecurityAttributes(List<SecurityAttribute> securityAttributes) { |
278 | 0 | this.securityAttributes = securityAttributes; |
279 | 0 | } |
280 | |
|
281 | |
public Boolean getInitiatorOk() { |
282 | 0 | return initiatorOk; |
283 | |
} |
284 | |
public void setInitiatorOk(Boolean initiatorOk) { |
285 | 0 | this.initiatorOk = initiatorOk; |
286 | 0 | } |
287 | |
|
288 | |
public Boolean getRouteLogAuthenticatedOk() { |
289 | 0 | return routeLogAuthenticatedOk; |
290 | |
} |
291 | |
public void setRouteLogAuthenticatedOk(Boolean routeLogAuthenticatedOk) { |
292 | 0 | this.routeLogAuthenticatedOk = routeLogAuthenticatedOk; |
293 | 0 | } |
294 | |
|
295 | |
public List<String> getAllowedRoles() { |
296 | 0 | return allowedRoles; |
297 | |
} |
298 | |
|
299 | |
public void setAllowedRoles(List<String> allowedRoles) { |
300 | 0 | this.allowedRoles = allowedRoles; |
301 | 0 | } |
302 | |
|
303 | |
public List<String> getDisallowedRoles() { |
304 | 0 | return disallowedRoles; |
305 | |
} |
306 | |
|
307 | |
public void setDisallowedRoles(List<String> disallowedRoles) { |
308 | 0 | this.disallowedRoles = disallowedRoles; |
309 | 0 | } |
310 | |
|
311 | |
public List<KeyValue> getSearchableAttributes() { |
312 | 0 | return searchableAttributes; |
313 | |
} |
314 | |
|
315 | |
public void setSearchableAttributes(List<KeyValue> searchableAttributes) { |
316 | 0 | this.searchableAttributes = searchableAttributes; |
317 | 0 | } |
318 | |
|
319 | |
public List<Group> getWorkgroups() { |
320 | 0 | return workgroups; |
321 | |
} |
322 | |
|
323 | |
public void setWorkgroups(List<Group> workgroups) { |
324 | 0 | this.workgroups = workgroups; |
325 | 0 | } |
326 | |
|
327 | |
public List<SecurityPermissionInfo> getPermissions() { |
328 | 0 | return this.permissions; |
329 | |
} |
330 | |
|
331 | |
public void setPermissions(List<SecurityPermissionInfo> permissions) { |
332 | 0 | this.permissions = permissions; |
333 | 0 | } |
334 | |
|
335 | |
public Boolean getActive() { |
336 | 0 | return active; |
337 | |
} |
338 | |
|
339 | |
public void setActive(Boolean active) { |
340 | 0 | this.active = active; |
341 | 0 | } |
342 | |
|
343 | |
public boolean isActive() { |
344 | 0 | if (active != null) { |
345 | 0 | return active.booleanValue(); |
346 | |
} |
347 | |
else { |
348 | 0 | return false; |
349 | |
} |
350 | |
} |
351 | |
} |