diff --git a/rm-community/rm-community-repo/config/alfresco/module/org_alfresco_module_rm/extended-repository-context.xml b/rm-community/rm-community-repo/config/alfresco/module/org_alfresco_module_rm/extended-repository-context.xml
index e5264e8139..939392423c 100644
--- a/rm-community/rm-community-repo/config/alfresco/module/org_alfresco_module_rm/extended-repository-context.xml
+++ b/rm-community/rm-community-repo/config/alfresco/module/org_alfresco_module_rm/extended-repository-context.xml
@@ -120,6 +120,7 @@
${rm.haspermissionmap.write}
+
diff --git a/rm-community/rm-community-repo/config/alfresco/module/org_alfresco_module_rm/messages/audit-service.properties b/rm-community/rm-community-repo/config/alfresco/module/org_alfresco_module_rm/messages/audit-service.properties
index f4f9ea6937..7e55d72cc7 100644
--- a/rm-community/rm-community-repo/config/alfresco/module/org_alfresco_module_rm/messages/audit-service.properties
+++ b/rm-community/rm-community-repo/config/alfresco/module/org_alfresco_module_rm/messages/audit-service.properties
@@ -14,4 +14,7 @@ rm.audit.audit-clear=Audit Clear
rm.audit.audit-view=Audit View
rm.audit.trail-file-fail=We couldn't generate an audit report. Check the audit details and try again, or speak with your I.T. Dept.
rm.audit.audit-report=Audit Report
+rm.audit.set-permission=Set Permission
+rm.audit.enable-inherit-permission=Inherited Permissions Switched On
+rm.audit.disable-inherit-permission=Inherited Permissions Switched Off
recordable-version-config=Auto-Declare Options
\ No newline at end of file
diff --git a/rm-community/rm-community-repo/config/alfresco/module/org_alfresco_module_rm/rm-service-context.xml b/rm-community/rm-community-repo/config/alfresco/module/org_alfresco_module_rm/rm-service-context.xml
index ee323cae0c..25f6fae4fd 100644
--- a/rm-community/rm-community-repo/config/alfresco/module/org_alfresco_module_rm/rm-service-context.xml
+++ b/rm-community/rm-community-repo/config/alfresco/module/org_alfresco_module_rm/rm-service-context.xml
@@ -462,6 +462,7 @@
+
@@ -980,6 +981,7 @@
before,
+ Map after,
+ boolean removeIfNoPropertyChanged);
+
/**
* Determines whether the RM audit log is currently enabled.
*
@@ -153,7 +166,6 @@ public interface RecordsManagementAuditService extends RecordsManagementAuditSer
*/
void stopAuditLog(NodeRef filePlan);
-
/**
* Clears the RM audit.
*
diff --git a/rm-community/rm-community-repo/source/java/org/alfresco/module/org_alfresco_module_rm/audit/RecordsManagementAuditServiceImpl.java b/rm-community/rm-community-repo/source/java/org/alfresco/module/org_alfresco_module_rm/audit/RecordsManagementAuditServiceImpl.java
index 032e3c5bca..d7041ea2d9 100644
--- a/rm-community/rm-community-repo/source/java/org/alfresco/module/org_alfresco_module_rm/audit/RecordsManagementAuditServiceImpl.java
+++ b/rm-community/rm-community-repo/source/java/org/alfresco/module/org_alfresco_module_rm/audit/RecordsManagementAuditServiceImpl.java
@@ -110,7 +110,7 @@ public class RecordsManagementAuditServiceImpl extends AbstractLifecycleBean
private static Log logger = LogFactory.getLog(RecordsManagementAuditServiceImpl.class);
private static final String ACCESS_AUDIT_CAPABILITY = "AccessAudit";
-
+
private static final String KEY_RM_AUDIT_NODE_RECORDS = "RMAUditNodeRecords";
protected static final String RM_AUDIT_EVENT_LOGIN_SUCCESS = "Login.Success";
@@ -284,7 +284,7 @@ public class RecordsManagementAuditServiceImpl extends AbstractLifecycleBean
{
this.namespaceService = namespaceService;
}
-
+
/**
* @param capabilityService capability service
*/
@@ -292,9 +292,7 @@ public class RecordsManagementAuditServiceImpl extends AbstractLifecycleBean
{
this.capabilityService = capabilityService;
}
-
-
-
+
/**
* @param ignoredAuditProperties
@@ -514,40 +512,87 @@ public class RecordsManagementAuditServiceImpl extends AbstractLifecycleBean
}
else
{
- Set auditDetails = TransactionalResourceHelper.getSet(KEY_RM_AUDIT_NODE_RECORDS);
- AlfrescoTransactionSupport.bindListener(txnListener);
-
// RM-936: Eliminate multiple audit maps from being generated when events with the same name are required to be fired multiple times in the same transaction.
// Check if auditDetails already contains an auditedNode with the same combination of nodeRef and eventName.
- boolean auditNodeAlreadyExists = false;
- for (RMAuditNode existingRMAuditNode : auditDetails)
+ RMAuditNode existingEventNode = findExistingEventNode(nodeRef, eventName);
+ if (existingEventNode != null)
{
- if (existingRMAuditNode.getNodeRef().equals(nodeRef) && existingRMAuditNode.getEventName().equals(eventName))
- {
- // If there exists such an auditNode, update its 'after' properties with the latest set of properties and leave its 'before' properties unchanged so that it
- // retains the original set of properties. The first 'before' and last 'after' will be diff'ed when comes to building the auditMap later when the transaction
- // commits.
- existingRMAuditNode.setNodePropertiesAfter(after);
- auditNodeAlreadyExists = true;
- break;
- }
+ // If there exists such an auditNode, update its 'after' properties with the latest set of properties and leave its 'before' properties unchanged so that it
+ // retains the original set of properties. The first 'before' and last 'after' will be diff'ed when comes to building the auditMap later when the transaction
+ // commits.
+ existingEventNode.setNodePropertiesAfter(after);
}
-
- if (!auditNodeAlreadyExists)
+ else
{
- // Create a new auditNode if it doesn't already exist
- RMAuditNode auditedNode = new RMAuditNode();
- auditedNode.setNodeRef(nodeRef);
- auditedNode.setEventName(eventName);
- auditedNode.setNodePropertiesBefore(before);
- auditedNode.setNodePropertiesAfter(after);
- auditedNode.setRemoveIfNoPropertyChanged(removeIfNoPropertyChanged);
-
- auditDetails.add(auditedNode);
+ createAuditEventInTransaction(nodeRef, eventName, before, after, removeIfNoPropertyChanged);
}
}
}
+ /** {@inheritDoc} */
+ @Override
+ public void auditOrUpdateEvent(NodeRef nodeRef, String eventName, Map before,
+ Map after, boolean removeIfNoPropertyChanged)
+ {
+ RMAuditNode existingEventNode = findExistingEventNode(nodeRef, eventName);
+ if (existingEventNode != null)
+ {
+ // Update the existing event to include all the new properties.
+ existingEventNode.getNodePropertiesBefore().putAll(before);
+ existingEventNode.getNodePropertiesAfter().putAll(after);
+ }
+ else
+ {
+ createAuditEventInTransaction(nodeRef, eventName, before, after, removeIfNoPropertyChanged);
+ }
+ }
+
+ /**
+ * Create a new audit event for this transaction.
+ *
+ * @param nodeRef The node the audit message is about.
+ * @param eventName The event.
+ * @param before The before property map to use.
+ * @param after The after property map to use.
+ * @param removeIfNoPropertyChanged Whether to remove the event if no properties have changed.
+ */
+ private void createAuditEventInTransaction(NodeRef nodeRef, String eventName, Map before,
+ Map after, boolean removeIfNoPropertyChanged)
+ {
+ // Create a new auditNode.
+ RMAuditNode auditedNode = new RMAuditNode();
+ auditedNode.setNodeRef(nodeRef);
+ auditedNode.setEventName(eventName);
+ auditedNode.setNodePropertiesBefore(before);
+ auditedNode.setNodePropertiesAfter(after);
+ auditedNode.setRemoveIfNoPropertyChanged(removeIfNoPropertyChanged);
+
+ // Add it to the transaction.
+ Set auditDetails = TransactionalResourceHelper.getSet(KEY_RM_AUDIT_NODE_RECORDS);
+ auditDetails.add(auditedNode);
+ }
+
+ /**
+ * Find an audit node if it already exists for the transaction.
+ *
+ * @param nodeRef The node the event is against.
+ * @param eventName The name of the event.
+ * @return The pre-existing event node, or null if none exists.
+ */
+ private RMAuditNode findExistingEventNode(NodeRef nodeRef, String eventName)
+ {
+ AlfrescoTransactionSupport.bindListener(txnListener);
+ Set auditDetails = TransactionalResourceHelper.getSet(KEY_RM_AUDIT_NODE_RECORDS);
+ for (RMAuditNode existingRMAuditNode : auditDetails)
+ {
+ if (existingRMAuditNode.getNodeRef().equals(nodeRef) && existingRMAuditNode.getEventName().equals(eventName))
+ {
+ return existingRMAuditNode;
+ }
+ }
+ return null;
+ }
+
/**
* Helper method to build audit map
*
@@ -929,7 +974,7 @@ public class RecordsManagementAuditServiceImpl extends AbstractLifecycleBean
// Skip it
return true;
}
-
+
if(nodeRef != null && nodeService.exists(nodeRef) &&
!AccessStatus.ALLOWED.equals(
capabilityService.getCapabilityAccessState(nodeRef, ACCESS_AUDIT_CAPABILITY)))
diff --git a/rm-community/rm-community-repo/source/java/org/alfresco/module/org_alfresco_module_rm/security/FilePlanPermissionServiceImpl.java b/rm-community/rm-community-repo/source/java/org/alfresco/module/org_alfresco_module_rm/security/FilePlanPermissionServiceImpl.java
index a148063bb5..2aa8c3f03f 100644
--- a/rm-community/rm-community-repo/source/java/org/alfresco/module/org_alfresco_module_rm/security/FilePlanPermissionServiceImpl.java
+++ b/rm-community/rm-community-repo/source/java/org/alfresco/module/org_alfresco_module_rm/security/FilePlanPermissionServiceImpl.java
@@ -27,6 +27,9 @@
package org.alfresco.module.org_alfresco_module_rm.security;
+import static java.util.Collections.singletonMap;
+import static org.alfresco.module.org_alfresco_module_rm.security.ExtendedReaderDynamicAuthority.EXTENDED_READER;
+import static org.alfresco.module.org_alfresco_module_rm.security.ExtendedWriterDynamicAuthority.EXTENDED_WRITER;
import static org.alfresco.repo.policy.Behaviour.NotificationFrequency.TRANSACTION_COMMIT;
import static org.alfresco.repo.policy.annotation.BehaviourKind.CLASS;
import static org.alfresco.repo.security.authentication.AuthenticationUtil.getSystemUserName;
@@ -34,10 +37,15 @@ import static org.alfresco.service.cmr.security.OwnableService.NO_OWNER;
import static org.alfresco.util.ParameterCheck.mandatory;
import static org.apache.commons.lang.BooleanUtils.isTrue;
+import java.io.Serializable;
+import java.util.HashMap;
import java.util.HashSet;
+import java.util.Map;
import java.util.Set;
import org.alfresco.error.AlfrescoRuntimeException;
+import org.alfresco.module.org_alfresco_module_rm.audit.RecordsManagementAuditService;
+import org.alfresco.module.org_alfresco_module_rm.audit.event.AuditEvent;
import org.alfresco.module.org_alfresco_module_rm.capability.RMPermissionModel;
import org.alfresco.module.org_alfresco_module_rm.fileplan.FilePlanService;
import org.alfresco.module.org_alfresco_module_rm.role.FilePlanRoleService;
@@ -48,6 +56,7 @@ import org.alfresco.repo.policy.PolicyComponent;
import org.alfresco.repo.policy.annotation.Behaviour;
import org.alfresco.repo.policy.annotation.BehaviourBean;
import org.alfresco.repo.security.authentication.AuthenticationUtil;
+import org.alfresco.repo.security.authentication.AuthenticationUtil.RunAsWork;
import org.alfresco.service.cmr.repository.ChildAssociationRef;
import org.alfresco.service.cmr.repository.NodeRef;
import org.alfresco.service.cmr.security.AccessPermission;
@@ -73,6 +82,12 @@ public class FilePlanPermissionServiceImpl extends ServiceBaseImpl
RMPermissionModel,
NodeServicePolicies.OnMoveNodePolicy
{
+ /** An audit key for the set permission event. */
+ private static final String AUDIT_SET_PERMISSION = "set-permission";
+
+ /** An namespace to use when constructing QNames to use for auditing changes to permissions. */
+ private static final String AUDIT_NAMESPACE = "audit://permissions/";
+
/** Permission service */
private PermissionService permissionService;
@@ -91,6 +106,9 @@ public class FilePlanPermissionServiceImpl extends ServiceBaseImpl
/** File plan service */
private FilePlanService filePlanService;
+ /** The RM audit service. */
+ private RecordsManagementAuditService recordsManagementAuditService;
+
/** Logger */
private static final Log LOGGER = LogFactory.getLog(FilePlanPermissionServiceImpl.class);
@@ -111,6 +129,16 @@ public class FilePlanPermissionServiceImpl extends ServiceBaseImpl
NodeServicePolicies.OnMoveNodePolicy.QNAME,
TYPE_RECORD_CATEGORY,
new JavaBehaviour(this, "onMoveNode", TRANSACTION_COMMIT));
+
+ AuthenticationUtil.runAsSystem(new RunAsWork()
+ {
+ @Override
+ public Void doWork() throws Exception
+ {
+ recordsManagementAuditService.registerAuditEvent(new AuditEvent(AUDIT_SET_PERMISSION, "rm.audit.set-permission"));
+ return null;
+ }
+ });
}
/**
@@ -227,6 +255,16 @@ public class FilePlanPermissionServiceImpl extends ServiceBaseImpl
this.filePlanService = filePlanService;
}
+ /**
+ * Set the RM audit service.
+ *
+ * @param recordsManagementAuditService The RM audit service.
+ */
+ public void setRecordsManagementAuditService(RecordsManagementAuditService recordsManagementAuditService)
+ {
+ this.recordsManagementAuditService = recordsManagementAuditService;
+ }
+
/**
* @see org.alfresco.module.org_alfresco_module_rm.security.FilePlanPermissionService#setupRecordCategoryPermissions(org.alfresco.service.cmr.repository.NodeRef)
*/
@@ -340,6 +378,7 @@ public class FilePlanPermissionServiceImpl extends ServiceBaseImpl
final boolean hasUserPermission = authenticationUtil.runAs(new AuthenticationUtil.RunAsWork()
{
+ @Override
public Boolean doWork()
{
return getPermissionService().hasPermission(nodeRef, RMPermissionModel.FILING) == AccessStatus.ALLOWED;
@@ -350,6 +389,7 @@ public class FilePlanPermissionServiceImpl extends ServiceBaseImpl
{
authenticationUtil.runAsSystem(new AuthenticationUtil.RunAsWork()
{
+ @Override
public Void doWork()
{
getPermissionService().setPermission(nodeRef, user, RMPermissionModel.FILING, true);
@@ -365,6 +405,7 @@ public class FilePlanPermissionServiceImpl extends ServiceBaseImpl
* @param parent parent node reference
* @param nodeRef child node reference
*/
+ @Override
public void setupPermissions(final NodeRef parent, final NodeRef nodeRef)
{
mandatory("parent", parent);
@@ -374,6 +415,7 @@ public class FilePlanPermissionServiceImpl extends ServiceBaseImpl
{
authenticationUtil.runAsSystem(new AuthenticationUtil.RunAsWork