mirror of
https://github.com/Alfresco/alfresco-community-repo.git
synced 2025-07-31 17:39:05 +00:00
Merge merge-2.4/MNT-16852_HF_2.2.0.2_Merge into release/V2.4.
This commit is contained in:
@@ -81,6 +81,12 @@ rm.completerecord.mandatorypropertiescheck.enabled=true
|
||||
#
|
||||
rm.patch.v22.convertToStandardFilePlan=false
|
||||
|
||||
# Permission mapping
|
||||
# these take a comma separated string of permissions from org.alfresco.service.cmr.security.PermissionService
|
||||
# read maps to ReadRecords and write to FileRecords
|
||||
rm.haspermissionmap.read=ReadProperties,ReadChildren
|
||||
rm.haspermissionmap.write=WriteProperties,AddChildren
|
||||
|
||||
#
|
||||
# Extended auto-version behaviour. If true and other auto-version properties are satisfied, then
|
||||
# a document will be auto-versioned when its type is changed.
|
||||
|
@@ -114,6 +114,12 @@
|
||||
<ref bean="extendedReaderDynamicAuthority" />
|
||||
</list>
|
||||
</property>
|
||||
<property name="configuredReadPermissions">
|
||||
<value>${rm.haspermissionmap.read}</value>
|
||||
</property>
|
||||
<property name="configuredFilePermissions">
|
||||
<value>${rm.haspermissionmap.write}</value>
|
||||
</property>
|
||||
</bean>
|
||||
<bean class="org.alfresco.util.BeanExtender">
|
||||
<property name="beanName" value="permissionServiceImpl"/>
|
||||
@@ -262,4 +268,4 @@
|
||||
</property>
|
||||
</bean>
|
||||
|
||||
</beans>
|
||||
</beans>
|
||||
|
@@ -27,6 +27,8 @@
|
||||
|
||||
package org.alfresco.module.org_alfresco_module_rm.permission;
|
||||
|
||||
import java.util.List;
|
||||
|
||||
import org.alfresco.module.org_alfresco_module_rm.capability.RMPermissionModel;
|
||||
import org.alfresco.module.org_alfresco_module_rm.model.RecordsManagementModel;
|
||||
import org.alfresco.repo.security.permissions.processor.impl.PermissionPostProcessorBaseImpl;
|
||||
@@ -55,20 +57,21 @@ public class RecordsManagementPermissionPostProcessor extends PermissionPostProc
|
||||
* @see org.alfresco.repo.security.permissions.processor.PermissionPostProcessor#process(org.alfresco.service.cmr.security.AccessStatus, org.alfresco.service.cmr.repository.NodeRef, java.lang.String)
|
||||
*/
|
||||
@Override
|
||||
public AccessStatus process(AccessStatus accessStatus, NodeRef nodeRef, String perm)
|
||||
public AccessStatus process(AccessStatus accessStatus, NodeRef nodeRef, String perm,
|
||||
List configuredReadPermissions, List configuredFilePermissions)
|
||||
{
|
||||
AccessStatus result = accessStatus;
|
||||
if (AccessStatus.DENIED.equals(accessStatus) &&
|
||||
nodeService.hasAspect(nodeRef, RecordsManagementModel.ASPECT_FILE_PLAN_COMPONENT))
|
||||
{
|
||||
// if read denied on rm artifact
|
||||
if (PermissionService.READ.equals(perm))
|
||||
if (PermissionService.READ.equals(perm) || configuredReadPermissions.contains(perm))
|
||||
{
|
||||
// check for read record
|
||||
result = permissionService.hasPermission(nodeRef, RMPermissionModel.READ_RECORDS);
|
||||
}
|
||||
// if write deinied on rm artificat
|
||||
else if (PermissionService.WRITE.equals(perm) || PermissionService.ADD_CHILDREN.equals(perm))
|
||||
else if (PermissionService.WRITE.equals(perm) || configuredFilePermissions.contains(perm))
|
||||
{
|
||||
// check for file record
|
||||
result = permissionService.hasPermission(nodeRef, RMPermissionModel.FILE_RECORDS);
|
||||
|
@@ -30,6 +30,7 @@ package org.alfresco.repo.security.permissions.impl;
|
||||
import static org.apache.commons.lang.StringUtils.isNotBlank;
|
||||
|
||||
import java.io.Serializable;
|
||||
import java.util.Arrays;
|
||||
import java.util.Collections;
|
||||
import java.util.HashSet;
|
||||
import java.util.List;
|
||||
@@ -40,6 +41,7 @@ import org.alfresco.module.org_alfresco_module_rm.fileplan.FilePlanService;
|
||||
import org.alfresco.module.org_alfresco_module_rm.model.RecordsManagementModel;
|
||||
import org.alfresco.module.org_alfresco_module_rm.role.FilePlanRoleService;
|
||||
import org.alfresco.repo.cache.SimpleCache;
|
||||
|
||||
import org.alfresco.repo.security.permissions.AccessControlEntry;
|
||||
import org.alfresco.repo.security.permissions.AccessControlList;
|
||||
import org.alfresco.repo.security.permissions.processor.PermissionPostProcessor;
|
||||
@@ -55,6 +57,7 @@ import org.alfresco.util.PropertyCheck;
|
||||
import org.apache.commons.lang.StringUtils;
|
||||
import org.springframework.context.ApplicationEvent;
|
||||
|
||||
|
||||
/**
|
||||
* Extends the core permission service implementation allowing the consideration of the read records
|
||||
* permission.
|
||||
@@ -69,6 +72,20 @@ public class ExtendedPermissionServiceImpl extends PermissionServiceImpl
|
||||
/** Writers simple cache */
|
||||
protected SimpleCache<Serializable, Set<String>> writersCache;
|
||||
|
||||
/**
|
||||
* Configured Permission mapping.
|
||||
* <p>
|
||||
* This string comes from alfresco-global.properties and allows fine tuning of the how permissions are mapped.
|
||||
* This was added as a fix for MNT-16852 to enhance compatibility with our Outlook Integration.
|
||||
*/
|
||||
protected List<String> configuredReadPermissions;
|
||||
/**
|
||||
* Configured Permission mapping.
|
||||
* <p>
|
||||
* This string also comes from alfresco-global.properties.
|
||||
*/
|
||||
protected List<String> configuredFilePermissions;
|
||||
|
||||
/** File plan service */
|
||||
private FilePlanService filePlanService;
|
||||
|
||||
@@ -126,6 +143,28 @@ public class ExtendedPermissionServiceImpl extends PermissionServiceImpl
|
||||
this.writersCache = writersCache;
|
||||
}
|
||||
|
||||
/**
|
||||
* Maps the string from the properties file (rm.haspermissionmap.read)
|
||||
* to the list used in the hasPermission method
|
||||
*
|
||||
* @param readMapping the mapping of permissions to ReadRecord
|
||||
*/
|
||||
public void setConfiguredReadPermissions(String readMapping)
|
||||
{
|
||||
this.configuredReadPermissions = Arrays.asList(readMapping.split(","));
|
||||
}
|
||||
|
||||
/**
|
||||
* Maps the string set in the properties file (rm.haspermissionmap.write)
|
||||
* to the list used in the hasPermission method
|
||||
*
|
||||
* @param fileMapping the mapping of permissions to FileRecord
|
||||
*/
|
||||
public void setConfiguredFilePermissions(String fileMapping)
|
||||
{
|
||||
this.configuredFilePermissions = Arrays.asList(fileMapping.split(","));
|
||||
}
|
||||
|
||||
/**
|
||||
* @see org.alfresco.repo.security.permissions.impl.PermissionServiceImpl#onBootstrap(org.springframework.context.ApplicationEvent)
|
||||
*/
|
||||
@@ -170,7 +209,7 @@ public class ExtendedPermissionServiceImpl extends PermissionServiceImpl
|
||||
for (PermissionPostProcessor postProcessor : postProcessors)
|
||||
{
|
||||
// post process permission
|
||||
result = postProcessor.process(result, nodeRef, perm);
|
||||
result = postProcessor.process(result, nodeRef, perm, this.configuredReadPermissions, this.configuredFilePermissions);
|
||||
}
|
||||
|
||||
return result;
|
||||
|
@@ -27,6 +27,8 @@
|
||||
|
||||
package org.alfresco.repo.security.permissions.processor;
|
||||
|
||||
import java.util.List;
|
||||
|
||||
import org.alfresco.service.cmr.repository.NodeRef;
|
||||
import org.alfresco.service.cmr.security.AccessStatus;
|
||||
|
||||
@@ -46,7 +48,9 @@ public interface PermissionPostProcessor
|
||||
* @param accessStatus current access status
|
||||
* @param nodeRef node reference
|
||||
* @param perm permission
|
||||
*
|
||||
* @return {@link AccessStatus}
|
||||
*/
|
||||
AccessStatus process(AccessStatus accessStatus, NodeRef nodeRef, String perm);
|
||||
AccessStatus process(AccessStatus accessStatus, NodeRef nodeRef, String perm,
|
||||
List configuredReadPermissions, List configuredFilePermissions);
|
||||
}
|
||||
|
@@ -0,0 +1,120 @@
|
||||
/*
|
||||
* #%L
|
||||
* Alfresco Records Management Module
|
||||
* %%
|
||||
* Copyright (C) 2005 - 2016 Alfresco Software Limited
|
||||
* %%
|
||||
* This file is part of the Alfresco software.
|
||||
* -
|
||||
* If the software was purchased under a paid Alfresco license, the terms of
|
||||
* the paid license agreement will prevail. Otherwise, the software is
|
||||
* provided under the following open source license terms:
|
||||
* -
|
||||
* Alfresco is free software: you can redistribute it and/or modify
|
||||
* it under the terms of the GNU Lesser General Public License as published by
|
||||
* the Free Software Foundation, either version 3 of the License, or
|
||||
* (at your option) any later version.
|
||||
* -
|
||||
* Alfresco is distributed in the hope that it will be useful,
|
||||
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
||||
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
||||
* GNU Lesser General Public License for more details.
|
||||
* -
|
||||
* You should have received a copy of the GNU Lesser General Public License
|
||||
* along with Alfresco. If not, see <http://www.gnu.org/licenses/>.
|
||||
* #L%
|
||||
*/
|
||||
|
||||
package org.alfresco.module.org_alfresco_module_rm.permission;
|
||||
|
||||
import static java.util.Arrays.asList;
|
||||
|
||||
import static org.junit.Assert.assertEquals;
|
||||
import static org.mockito.Mockito.when;
|
||||
|
||||
import java.util.List;
|
||||
|
||||
import org.alfresco.module.org_alfresco_module_rm.capability.RMPermissionModel;
|
||||
import org.alfresco.module.org_alfresco_module_rm.model.RecordsManagementModel;
|
||||
import org.alfresco.module.org_alfresco_module_rm.test.util.AlfMock;
|
||||
import org.alfresco.service.cmr.repository.NodeRef;
|
||||
import org.alfresco.service.cmr.repository.NodeService;
|
||||
import org.alfresco.service.cmr.security.AccessStatus;
|
||||
import org.alfresco.service.cmr.security.PermissionService;
|
||||
import org.junit.Before;
|
||||
import org.junit.Test;
|
||||
import org.mockito.InjectMocks;
|
||||
import org.mockito.Mock;
|
||||
import org.mockito.MockitoAnnotations;
|
||||
|
||||
/**
|
||||
* Unit tests for {@link RecordsManagementPermissionPostProcessor}.
|
||||
*
|
||||
* @author David Webster
|
||||
* @since 2.4.1
|
||||
*/
|
||||
public class RecordsManagementPermissionPostProcessorUnitTest
|
||||
{
|
||||
|
||||
private @InjectMocks
|
||||
RecordsManagementPermissionPostProcessor recordsManagementPermissionPostProcessor = new RecordsManagementPermissionPostProcessor();
|
||||
|
||||
private @Mock NodeService nodeService;
|
||||
private @Mock PermissionService permissionService;
|
||||
|
||||
@Before
|
||||
public void setup()
|
||||
{
|
||||
MockitoAnnotations.initMocks(this);
|
||||
}
|
||||
|
||||
/**
|
||||
* Given the configured permissions are set
|
||||
* When process is called
|
||||
* Then access is allowed
|
||||
*/
|
||||
@Test
|
||||
public void configurePermissionsAllowed()
|
||||
{
|
||||
AccessStatus accessStatus = AccessStatus.DENIED;
|
||||
NodeRef nodeRef = new NodeRef("node://ref/");
|
||||
String perm = AlfMock.generateText();
|
||||
// permissions includes the perm created above
|
||||
List<String> configuredReadPermissions = asList("ReadProperties", "ReadChildren", perm);
|
||||
List<String> configuredFilePermissions = asList("WriteProperties", "AddChildren");
|
||||
|
||||
when(nodeService.hasAspect(nodeRef, RecordsManagementModel.ASPECT_FILE_PLAN_COMPONENT))
|
||||
.thenReturn(true);
|
||||
when(permissionService.hasPermission(nodeRef, RMPermissionModel.READ_RECORDS))
|
||||
.thenReturn(AccessStatus.ALLOWED);
|
||||
|
||||
AccessStatus result = recordsManagementPermissionPostProcessor.process(accessStatus, nodeRef, perm, configuredReadPermissions, configuredFilePermissions);
|
||||
|
||||
assertEquals(AccessStatus.ALLOWED, result);
|
||||
}
|
||||
|
||||
/**
|
||||
* Given the configured permissions are not set
|
||||
* When process is called
|
||||
* Then access is denied
|
||||
*/
|
||||
@Test
|
||||
public void configurePermissionsDenied()
|
||||
{
|
||||
AccessStatus accessStatus = AccessStatus.DENIED;
|
||||
NodeRef nodeRef = new NodeRef("node://ref/");
|
||||
String perm = AlfMock.generateText();
|
||||
// permissions do not include perm created above
|
||||
List<String> configuredReadPermissions = asList("ReadProperties", "ReadChildren");
|
||||
List<String> configuredFilePermissions = asList("WriteProperties", "AddChildren");
|
||||
|
||||
when(nodeService.hasAspect(nodeRef, RecordsManagementModel.ASPECT_FILE_PLAN_COMPONENT))
|
||||
.thenReturn(true);
|
||||
when(permissionService.hasPermission(nodeRef, RMPermissionModel.READ_RECORDS))
|
||||
.thenReturn(AccessStatus.ALLOWED);
|
||||
|
||||
AccessStatus result = recordsManagementPermissionPostProcessor.process(accessStatus, nodeRef, perm, configuredReadPermissions, configuredFilePermissions);
|
||||
|
||||
assertEquals(AccessStatus.DENIED, result);
|
||||
}
|
||||
}
|
@@ -34,6 +34,8 @@ import static org.mockito.Mockito.never;
|
||||
import static org.mockito.Mockito.verify;
|
||||
import static org.mockito.Mockito.when;
|
||||
|
||||
import java.util.List;
|
||||
|
||||
import org.alfresco.module.org_alfresco_module_rm.test.util.AlfMock;
|
||||
import org.alfresco.module.org_alfresco_module_rm.test.util.BaseUnitTest;
|
||||
import org.alfresco.repo.security.permissions.processor.PermissionPostProcessor;
|
||||
@@ -121,15 +123,21 @@ public class ExtendedPermissionServiceImplUnitTest extends BaseUnitTest
|
||||
{
|
||||
NodeRef nodeRef = generateCmContent("anyname");
|
||||
String perm = AlfMock.generateText();
|
||||
List<String> configuredReadPermissions = asList("ReadProperties", "ReadChildren");
|
||||
List<String> configuredFilePermissions = asList("WriteProperties", "AddChildren");
|
||||
|
||||
extendedPermissionServiceImpl.setConfiguredReadPermissions("ReadProperties,ReadChildren");
|
||||
extendedPermissionServiceImpl.setConfiguredFilePermissions("WriteProperties,AddChildren");
|
||||
|
||||
when(mockedPermissionProcessorRegistry.getPermissionPostProcessors())
|
||||
.thenReturn(asList(mockedPermissionPostProcessor));
|
||||
when(mockedPermissionPostProcessor.process(AccessStatus.UNDETERMINED, nodeRef, perm))
|
||||
when(mockedPermissionPostProcessor.process(AccessStatus.UNDETERMINED, nodeRef, perm, configuredReadPermissions, configuredFilePermissions))
|
||||
.thenReturn(AccessStatus.ALLOWED);
|
||||
|
||||
AccessStatus result = extendedPermissionServiceImpl.hasPermission(nodeRef, perm);
|
||||
|
||||
assertEquals(AccessStatus.ALLOWED, result);
|
||||
verify(mockedPermissionPostProcessor).process(AccessStatus.UNDETERMINED, nodeRef, perm);
|
||||
verify(mockedPermissionPostProcessor).process(AccessStatus.UNDETERMINED, nodeRef, perm, configuredReadPermissions, configuredFilePermissions);
|
||||
verify(extendedPermissionServiceImpl).hasPermissionImpl(nodeRef, perm);
|
||||
}
|
||||
}
|
||||
|
Reference in New Issue
Block a user