mirror of
https://github.com/Alfresco/alfresco-community-repo.git
synced 2025-07-07 18:25:23 +00:00
17717: This check-in contains changes in Java and .NET TCK tests related to CMIS-43 and CMIS-44 JIRA tasks. Also some bugs were faced out and fixed in 17727: CMIS-69: Alfresco to CMIS ACL mapping: Part 1: API 17732: Merge HEAD to DEV/CMIS10 17756: MOB-563: SQL Tests - Lexer 17764: CMIS-69: Alfresco to CMIS ACL mapping: get ACL support 17802: More for CMIS-69: Alfresco to CMIS ACL mapping. Implementation for applyAcl. 17830: Fixes for CMIS lexer and parser tests 17838: Access fix ups for access by the WS/Rest layers 17869: 1) remote-api: 17874: SAIL-146: Alfresco to CMIS ACL mapping: Support to group ACEs by principal id 17883: Adjust version properties for dev/cmis10 branch. 17885: Update OASIS CMIS TC status. 17889: Fix issue where objectid is not rendered correctly for CMIS private working copies. 17890: SAIL-146: Alfresco to CMIS ACL mapping: Fixes for ACL merging when reporting and ordering of ACEs. Report full permissions and not unique short names. 17902: Fix issue where CMIS queries via GET used incorrect defaults for paging. 17909: Fix CMIS link relations for folder tree. 17912: Fix CMIS type descendants atompub link 17922: Update AtomPub binding to CMIS 1.0 CD05 XSDs. 17924: SAIL-146: Alfresco to CMIS ACL mapping: Test set using full permissions (as opposed to short unique names) 17927: Fix content stream create/update status to comply with CMIS 1.0 CD05. 17934: Resolve encoding issues in CMIS AtomPub binding. 17973: SAIL-171: CMIS Renditions REST binding 17975: SAIL-146: Alfresco to CMIS ACL mapping: Completed AllowedAction and Permissions mapping. Added missing canDeleteTree. 17990: Update CMIS AtomPub to CD06 17996: Updates for cmis.alfresco.com for CD06 in prep for public review 2. 18007: WS-Bindings were updated with CMIS 1.0 cd06 changes. 18016: CMIS web services: Add missing generated files from WSDL 18018: CMIS index page updates for cmis.alfresco.com 18041: Merged HEAD to DEV/CMIS_10 18059: SAIL-227: 18067: SAIL-157: Strict vs Non-Strict Query Language: Enforce restrictions on the use of SCORE() and CONTAINS() 18080: Fix for SAIL-213:Bug: Query engine does not check that select list properties are valid for selectors 18131: SAIL-156: Query Language Compliance: Fix support for LIKE, including escaping of '%' and '_' with '\'. 18132: SAIL-156: Query Language Compliance: Fix support for LIKE, including escaping of '%' and '_' with '\': Fix underlying lucene impl for prefix and fuzzy queries to match wildcard/like 18143: SAIL-156: Query Language Compliance: Fix and check qualifiers in IN_TREE and IN_FOLDER. Improved scoring for CONTAINS() 18173: SAIL-245: Exclude thumbnails from normal query results 18179: SAIL 214: Query Language Compliance: Check for valid object ids in IN_FOLDER and IN_TREE 18210: SAIL-156: Query Language Compliance: Support for simple column aliases in predicates/function arguments/embedded FTS. Check property/selector binding in embedded FTS. 18211: SAIL-156: Query Language Compliance: Support for simple column aliases in predicates/function arguments/embedded FTS. Check property/selector binding in embedded FTS. 18215: SAIL 156: Query Language Compliance: Fix CMIS type info to reflect the underlying settings of the Alfresco type for includeInSuperTypeQuery 18244: SAIL 156: Query Language Compliance: includeInSuperTypeQuery -> includedInSuperTypeQuery: First cut of cmis query test model. Fixed modelSchema.xml to validate 18255: SAIL 156: Query Language Compliance: First set of tests for predicates using properties mapped to CMIS Strings. 18261: CMIS-49 SAIL-163: Alfresco to CMIS Change Log mapping - New CMIS Audit mapping is implemented. ChangeLogDataExtractor was added. 18263: Build Fix 18285: SAIL 156: Query Language Compliance: Restrictions on predicates that may be used by single-valued and multi-valued properties 18287: SAIL-186: Changes to make CMIS Rendition REST bindings pass new TCK tests 18291: Fix Eclipse classpath problems 18323: CMIS-44 SAIL-187: Change Log tests (WS) – Java and .NET tests for change log were implemented. 18325: SAIL 156: Query Language Compliance: Fixes and tests for d:mltext mappings 18329: Updated Chemistry TCK jar including Dave W's rendition tests. 18333: Fix compile error - spurious imports. 18334: Fix issue where absurl web script method failed when deployed to root context. 18339: Update CMIS index page for start of public review 2. 18387: SAIL-147: CMIS ACL REST bindings + framework fixes 18392: Fix typo 18394: SAIL 156: Query Language Compliance: Fixes and tests for d:<numeric> 18406: SAIL 156: Query Language Compliance: Remaining type/predicate combinations. Restriction of In/Comparisons for ID/Boolean 18408: CMIS Query language - remove (pointless) multi-valued column from language definition 18409: Formatting change for CMIS.g 18410: Formatting change for FTS.g 18411: CMIS TCK tests were updated to CMIS 1.0 cd06 schemas. 18412: SAIL 156: Query Language Compliance: Tests and fixes for aliases for all data types in simple predicates (they behave as the direct column reference) 18417: Update Chemistry TCK which now incorporates Dave W's ACL tests. 18419: Update CMIS index page to include public review end date. 18427: SAIL 156: Query Language Compliance: Expose multi-valued properties in queries. Tests for all accessors. Fix content length to be long. 18435: SAIL 156: Query Language Compliance: Use queryable correctly and fix up model mappings. Add tests for baseTypeId, contentStreamId and path. 18472: SAIL 156: Query Language Compliance: Tests and fixes for FTS/Contains expressions. Adhere strictly to the spec - no extensions available by default. Improved FTS error reporting (and stop any recovery). 18477: SAIL-164: CMIS change log REST bindings 18495: SAIL 156: Query Language Compliance: Tests and fixes for escaping in string literals, LIKE and FTS expressions. 18537: SAIL 156: Query Language Compliance: Sorting support. Basic sort test for all orderable/indexed CMIS properties. 18538: SAIL-164: CMIS change log fixes for TCK compliance 18547: SAIL 156: Query Language Compliance: Ordering tests for all datatypes, including null values. 18582: Incorporate latest Chemistry TCK 18583: Update list of supported CMIS capabilities in index page. 18606: SAIL-156, SAIL-157, SAIL-158: Query Language Compliance: Respect all query options including locale. Fixes and tests for MLText cross language support. 18608: SAIL-159: Java / Javascript API access to CMIS Query Language 18617: SAIL-158: Query Tests: Check policy and relationship types are not queryable. 18636: SAIL-184: ACL tests (WS) 18663: ACL tests were updated in accordance with last requirements by David Caruana. 18680: Update to CMIS CD07 18681: Fix CMIS ContentStreamId property when document has no content. 18700: CMIS: Head merge problem resolution. Phase 1: Merge up to and including revision 18700, as this the point where both AtomPub and Web Services TCK tests succeed completely on dev branch. Note: includes CMIS rendition support ready for integration and testing with DM renditions. git-svn-id: https://svn.alfresco.com/repos/alfresco-enterprise/alfresco/HEAD/root@18790 c4b6b30b-aa2e-2d43-bbcb-ca4b014f7261
493 lines
17 KiB
Java
493 lines
17 KiB
Java
/*
|
|
* Copyright (C) 2005-2010 Alfresco Software Limited.
|
|
*
|
|
* This program is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU General Public License
|
|
* as published by the Free Software Foundation; either version 2
|
|
* of the License, or (at your option) any later version.
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
|
|
|
|
* As a special exception to the terms and conditions of version 2.0 of
|
|
* the GPL, you may redistribute this Program in connection with Free/Libre
|
|
* and Open Source Software ("FLOSS") applications as described in Alfresco's
|
|
* FLOSS exception. You should have received a copy of the text describing
|
|
* the FLOSS exception, and it is also available here:
|
|
* http://www.alfresco.com/legal/licensing"
|
|
*/
|
|
package org.alfresco.cmis.acl;
|
|
|
|
import java.util.ArrayList;
|
|
import java.util.Collections;
|
|
import java.util.Comparator;
|
|
import java.util.EnumSet;
|
|
import java.util.LinkedHashSet;
|
|
import java.util.List;
|
|
import java.util.Map;
|
|
import java.util.Set;
|
|
|
|
import org.alfresco.cmis.CMISAccessControlEntry;
|
|
import org.alfresco.cmis.CMISAccessControlFormatEnum;
|
|
import org.alfresco.cmis.CMISAccessControlReport;
|
|
import org.alfresco.cmis.CMISAccessControlService;
|
|
import org.alfresco.cmis.CMISAclCapabilityEnum;
|
|
import org.alfresco.cmis.CMISAclPropagationEnum;
|
|
import org.alfresco.cmis.CMISAclSupportedPermissionEnum;
|
|
import org.alfresco.cmis.CMISAllowedActionEnum;
|
|
import org.alfresco.cmis.CMISConstraintException;
|
|
import org.alfresco.cmis.CMISDictionaryService;
|
|
import org.alfresco.cmis.CMISPermissionDefinition;
|
|
import org.alfresco.cmis.CMISPermissionMapping;
|
|
import org.alfresco.cmis.CMISTypeDefinition;
|
|
import org.alfresco.cmis.mapping.CMISMapping;
|
|
import org.alfresco.repo.security.authentication.AuthenticationUtil;
|
|
import org.alfresco.repo.security.permissions.PermissionReference;
|
|
import org.alfresco.repo.security.permissions.impl.AccessPermissionImpl;
|
|
import org.alfresco.repo.security.permissions.impl.ModelDAO;
|
|
import org.alfresco.service.cmr.repository.NodeRef;
|
|
import org.alfresco.service.cmr.repository.NodeService;
|
|
import org.alfresco.service.cmr.security.AccessPermission;
|
|
import org.alfresco.service.cmr.security.AccessStatus;
|
|
import org.alfresco.service.cmr.security.PermissionService;
|
|
import org.alfresco.service.namespace.QName;
|
|
|
|
/**
|
|
* @author andyh
|
|
*/
|
|
public class CMISAccessControlServiceImpl implements CMISAccessControlService
|
|
{
|
|
private CMISAclCapabilityEnum aclCapabilityEnum;
|
|
|
|
private CMISAclSupportedPermissionEnum aclSupportedPermissionEnum;
|
|
|
|
private CMISAclPropagationEnum aclPropagationEnum;
|
|
|
|
private ModelDAO permissionModelDao;
|
|
|
|
private PermissionService permissionService;
|
|
|
|
private CMISMapping cmisMapping;
|
|
|
|
private NodeService nodeService;
|
|
|
|
private CMISDictionaryService cmisDictionaryService;
|
|
|
|
/**
|
|
* @param aclCapabilityEnum
|
|
* the aclCapabilityEnum to set
|
|
*/
|
|
public void setAclCapabilityEnum(CMISAclCapabilityEnum aclCapabilityEnum)
|
|
{
|
|
this.aclCapabilityEnum = aclCapabilityEnum;
|
|
}
|
|
|
|
/**
|
|
* Sets the acl supported permission enum.
|
|
*
|
|
* @param aclSupportedPermissionEnum
|
|
* the aclSupportedPermissionEnum to set
|
|
*/
|
|
public void setAclSupportedPermissionEnum(CMISAclSupportedPermissionEnum aclSupportedPermissionEnum)
|
|
{
|
|
this.aclSupportedPermissionEnum = aclSupportedPermissionEnum;
|
|
}
|
|
|
|
/**
|
|
* @param aclPropagationEnum
|
|
* the aclPropagationEnum to set
|
|
*/
|
|
public void setAclPropagationEnum(CMISAclPropagationEnum aclPropagationEnum)
|
|
{
|
|
this.aclPropagationEnum = aclPropagationEnum;
|
|
}
|
|
|
|
/**
|
|
* @param permissionModelDao
|
|
* the permissionModelDao to set
|
|
*/
|
|
public void setPermissionModelDao(ModelDAO permissionModelDao)
|
|
{
|
|
this.permissionModelDao = permissionModelDao;
|
|
}
|
|
|
|
/**
|
|
* @param permissionService
|
|
* the permissionService to set
|
|
*/
|
|
public void setPermissionService(PermissionService permissionService)
|
|
{
|
|
this.permissionService = permissionService;
|
|
}
|
|
|
|
/**
|
|
* Sets the cmis mapping.
|
|
*
|
|
* @param cmisMapping
|
|
* the cmis mapping
|
|
*/
|
|
public void setCMISMapping(CMISMapping cmisMapping)
|
|
{
|
|
this.cmisMapping = cmisMapping;
|
|
}
|
|
|
|
/**
|
|
* @param nodeService
|
|
* the nodeService to set
|
|
*/
|
|
public void setNodeService(NodeService nodeService)
|
|
{
|
|
this.nodeService = nodeService;
|
|
}
|
|
|
|
/**
|
|
* @param cmisDictionaryService
|
|
* the cmisDictionaryService to set
|
|
*/
|
|
public void setCMISDictionaryService(CMISDictionaryService cmisDictionaryService)
|
|
{
|
|
this.cmisDictionaryService = cmisDictionaryService;
|
|
}
|
|
|
|
/*
|
|
* (non-Javadoc)
|
|
* @see org.alfresco.cmis.CMISAccessControlService#applyAcl(org.alfresco.service.cmr.repository.NodeRef,
|
|
* java.util.List)
|
|
*/
|
|
public CMISAccessControlReport applyAcl(NodeRef nodeRef, List<CMISAccessControlEntry> acesToApply)
|
|
{
|
|
Set<CMISAccessControlEntry> acesToAdd = new LinkedHashSet<CMISAccessControlEntry>(acesToApply);
|
|
List<? extends CMISAccessControlEntry> acesExisting = getAcl(nodeRef,
|
|
CMISAccessControlFormatEnum.REPOSITORY_SPECIFIC_PERMISSIONS).getAccessControlEntries();
|
|
List<CMISAccessControlEntry> acesToRemove = new ArrayList<CMISAccessControlEntry>(acesExisting.size());
|
|
for (CMISAccessControlEntry accessControlEntry : acesExisting)
|
|
{
|
|
// Only pay attention to existing direct entries
|
|
if (accessControlEntry.getDirect() && !acesToAdd.remove(accessControlEntry))
|
|
{
|
|
acesToRemove.add(accessControlEntry);
|
|
}
|
|
}
|
|
return applyAcl(nodeRef, acesToRemove, new ArrayList<CMISAccessControlEntry>(acesToAdd),
|
|
CMISAclPropagationEnum.PROPAGATE,
|
|
CMISAccessControlFormatEnum.REPOSITORY_SPECIFIC_PERMISSIONS);
|
|
}
|
|
|
|
/*
|
|
* (non-Javadoc)
|
|
*
|
|
* @see org.alfresco.cmis.CMISAccessControlService#applyAcl(org.alfresco.service.cmr.repository.NodeRef,
|
|
* java.util.List, java.util.List, org.alfresco.cmis.CMISAclPropagationEnum)
|
|
*/
|
|
public CMISAccessControlReport applyAcl(NodeRef nodeRef, List<CMISAccessControlEntry> acesToRemove, List<CMISAccessControlEntry> acesToAdd, CMISAclPropagationEnum propagation,
|
|
CMISAccessControlFormatEnum format)
|
|
{
|
|
if (propagation != CMISAclPropagationEnum.PROPAGATE)
|
|
{
|
|
throw new CMISConstraintException("Unsupported ACL propagation mode: " + propagation);
|
|
}
|
|
// Check controllable ACL
|
|
QName type = nodeService.getType(nodeRef);
|
|
CMISTypeDefinition cmisType = cmisDictionaryService.findTypeForClass(type);
|
|
if (false == cmisType.isControllableACL())
|
|
{
|
|
throw new CMISConstraintException("ACLs are not supported for type: " + cmisType.getDisplayName());
|
|
}
|
|
// TODO: Check valid permissions. We do not check this internally. Ignore for now ...
|
|
|
|
if (acesToRemove != null)
|
|
{
|
|
Set<AccessPermission> permissions = permissionService.getAllSetPermissions(nodeRef);
|
|
for (CMISAccessControlEntry entry : acesToRemove)
|
|
{
|
|
String alfrescoPermission = cmisMapping.getSetPermission(compressPermission(entry.getPermission()));
|
|
AccessPermission toCheck = new AccessPermissionImpl(alfrescoPermission, AccessStatus.ALLOWED, entry.getPrincipalId(), 0);
|
|
if (false == permissions.contains(toCheck))
|
|
{
|
|
throw new CMISConstraintException("No matching ACE found to delete");
|
|
}
|
|
permissionService.deletePermission(nodeRef, entry.getPrincipalId(), alfrescoPermission);
|
|
}
|
|
}
|
|
if (acesToAdd != null)
|
|
{
|
|
for (CMISAccessControlEntry entry : acesToAdd)
|
|
{
|
|
String alfrescoPermission = cmisMapping.getSetPermission(compressPermission(entry.getPermission()));
|
|
permissionService.setPermission(nodeRef, entry.getPrincipalId(), alfrescoPermission, true);
|
|
}
|
|
}
|
|
return getAcl(nodeRef, format);
|
|
}
|
|
|
|
/*
|
|
* (non-Javadoc)
|
|
*
|
|
* @see org.alfresco.cmis.CMISAccessControlService#getAcl(org.alfresco.service.cmr.repository.NodeRef,
|
|
* org.alfresco.cmis.CMISAccessControlFormatEnum)
|
|
*/
|
|
public CMISAccessControlReport getAcl(NodeRef nodeRef, CMISAccessControlFormatEnum format)
|
|
{
|
|
CMISAccessControlReportImpl answer = new CMISAccessControlReportImpl();
|
|
// Need to compact deny to mask correctly
|
|
Set<AccessPermission> permissions = permissionService.getAllSetPermissions(nodeRef);
|
|
ArrayList<AccessPermission> ordered = new ArrayList<AccessPermission>();
|
|
AccessPermissionComparator comparator = new AccessPermissionComparator();
|
|
for (AccessPermission current : permissions)
|
|
{
|
|
int index = Collections.binarySearch(ordered, current, comparator);
|
|
if (index < 0)
|
|
{
|
|
ordered.add(-index - 1, current);
|
|
}
|
|
}
|
|
|
|
for (AccessPermission entry : ordered)
|
|
{
|
|
if (entry.getAccessStatus() == AccessStatus.ALLOWED)
|
|
{
|
|
answer.addEntry(new CMISAccessControlEntryImpl(entry.getAuthority(), expandPermission(cmisMapping.getReportedPermission(getPermission(entry.getPermission()),
|
|
format)), entry.getPosition()));
|
|
}
|
|
else if (entry.getAccessStatus() == AccessStatus.DENIED)
|
|
{
|
|
answer.removeEntry(new CMISAccessControlEntryImpl(entry.getAuthority(), expandPermission(cmisMapping.getReportedPermission(getPermission(entry.getPermission()),
|
|
format)), entry.getPosition()));
|
|
}
|
|
}
|
|
return answer;
|
|
}
|
|
|
|
private String getPermission(String string)
|
|
{
|
|
PermissionReference permissionReference = permissionModelDao.getPermissionReference(null, string);
|
|
if (permissionModelDao.isUnique(permissionReference))
|
|
{
|
|
return permissionReference.getName();
|
|
}
|
|
else
|
|
{
|
|
return permissionReference.toString();
|
|
}
|
|
}
|
|
|
|
private String expandPermission(String permission)
|
|
{
|
|
if (permission.equals(CMIS_ALL_PERMISSION))
|
|
{
|
|
return permission;
|
|
}
|
|
else if (permission.equals(CMIS_READ_PERMISSION))
|
|
{
|
|
return permission;
|
|
}
|
|
else if (permission.equals(CMIS_WRITE_PERMISSION))
|
|
{
|
|
return permission;
|
|
|
|
}
|
|
else if (permission.startsWith("{"))
|
|
{
|
|
return permission;
|
|
}
|
|
else
|
|
{
|
|
PermissionReference permissionReference = permissionModelDao.getPermissionReference(null, permission);
|
|
return permissionReference.toString();
|
|
}
|
|
}
|
|
|
|
private String compressPermission(String permission) {
|
|
int sepIndex;
|
|
if (permission.equals(CMIS_ALL_PERMISSION) || permission.equals(CMIS_READ_PERMISSION)
|
|
|| permission.equals(CMIS_WRITE_PERMISSION) || !permission.startsWith("{")
|
|
|| (sepIndex = permission.lastIndexOf('.')) == -1) {
|
|
return permission;
|
|
}
|
|
return permission.substring(sepIndex + 1);
|
|
}
|
|
|
|
/*
|
|
* (non-Javadoc)
|
|
*
|
|
* @see org.alfresco.cmis.CMISAccessControlService#getAclCapability()
|
|
*/
|
|
public CMISAclCapabilityEnum getAclCapability()
|
|
{
|
|
return aclCapabilityEnum;
|
|
}
|
|
|
|
/**
|
|
* Set the acl capability enum.
|
|
*
|
|
* @param aclCapabilityEnum
|
|
*/
|
|
public void setAclCapability(CMISAclCapabilityEnum aclCapabilityEnum)
|
|
{
|
|
this.aclCapabilityEnum = aclCapabilityEnum;
|
|
}
|
|
|
|
/*
|
|
* (non-Javadoc)
|
|
* @see org.alfresco.cmis.CMISAccessControlService#getSupportedPermissions()
|
|
*/
|
|
public CMISAclSupportedPermissionEnum getSupportedPermissions()
|
|
{
|
|
return this.aclSupportedPermissionEnum;
|
|
}
|
|
|
|
/**
|
|
* Sets the supported permissions.
|
|
*
|
|
* @param aclSupportedPermissionEnum
|
|
* the supported permissions
|
|
*/
|
|
public void setSupportedPermissions(CMISAclSupportedPermissionEnum aclSupportedPermissionEnum)
|
|
{
|
|
this.aclSupportedPermissionEnum = aclSupportedPermissionEnum;
|
|
}
|
|
|
|
/*
|
|
* (non-Javadoc)
|
|
*
|
|
* @see org.alfresco.cmis.CMISAccessControlService#getAclPropagation()
|
|
*/
|
|
public CMISAclPropagationEnum getAclPropagation()
|
|
{
|
|
return aclPropagationEnum;
|
|
}
|
|
|
|
/**
|
|
* Set the acl propagation enum.
|
|
*
|
|
* @param aclPropagationEnum
|
|
*/
|
|
public void setAclPropagation(CMISAclPropagationEnum aclPropagationEnum)
|
|
{
|
|
this.aclPropagationEnum = aclPropagationEnum;
|
|
}
|
|
|
|
/*
|
|
* (non-Javadoc)
|
|
*
|
|
* @see org.alfresco.cmis.CMISAccessControlService#getPermissionMappings()
|
|
*/
|
|
public List<? extends CMISPermissionMapping> getPermissionMappings()
|
|
{
|
|
ArrayList<CMISPermissionMappingImpl> mappings = new ArrayList<CMISPermissionMappingImpl>();
|
|
for(CMISAllowedActionEnum e : EnumSet.allOf(CMISAllowedActionEnum.class))
|
|
{
|
|
Map<String, List<String>> enumMappings = e.getPermissionMapping();
|
|
for(String key : enumMappings.keySet())
|
|
{
|
|
List<String> list = enumMappings.get(key);
|
|
CMISPermissionMappingImpl mapping = new CMISPermissionMappingImpl(key, list);
|
|
mappings.add(mapping);
|
|
}
|
|
}
|
|
return mappings;
|
|
}
|
|
|
|
/*
|
|
* (non-Javadoc)
|
|
*
|
|
* @see org.alfresco.cmis.CMISAccessControlService#getRepositoryPermissions()
|
|
*/
|
|
public List<CMISPermissionDefinition> getRepositoryPermissions()
|
|
{
|
|
ArrayList<CMISPermissionDefinition> answer = new ArrayList<CMISPermissionDefinition>();
|
|
PermissionReference allPermission = permissionModelDao.getPermissionReference(null, PermissionService.ALL_PERMISSIONS);
|
|
Set<PermissionReference> all = permissionModelDao.getAllExposedPermissions();
|
|
for (PermissionReference pr : all)
|
|
{
|
|
addPermissionDefinition(answer, pr);
|
|
}
|
|
// Add All
|
|
addPermissionDefinition(answer, allPermission);
|
|
// Add CMIS permissions
|
|
answer.add(new CMISPermissionDefinitionImpl(CMIS_ALL_PERMISSION));
|
|
answer.add(new CMISPermissionDefinitionImpl(CMIS_READ_PERMISSION));
|
|
answer.add(new CMISPermissionDefinitionImpl(CMIS_WRITE_PERMISSION));
|
|
return answer;
|
|
}
|
|
|
|
/*
|
|
* (non-Javadoc)
|
|
* @see org.alfresco.cmis.CMISAccessControlService#getPrincipalAnonymous()
|
|
*/
|
|
public String getPrincipalAnonymous()
|
|
{
|
|
return AuthenticationUtil.getGuestUserName();
|
|
}
|
|
|
|
/*
|
|
* (non-Javadoc)
|
|
* @see org.alfresco.cmis.CMISAccessControlService#getPrincipalAnyone()
|
|
*/
|
|
public String getPrincipalAnyone()
|
|
{
|
|
return PermissionService.ALL_AUTHORITIES;
|
|
}
|
|
|
|
private void addPermissionDefinition(ArrayList<CMISPermissionDefinition> list, PermissionReference pr)
|
|
{
|
|
CMISPermissionDefinitionImpl def = new CMISPermissionDefinitionImpl(getPermissionString(pr));
|
|
list.add(def);
|
|
}
|
|
|
|
private String getPermissionString(PermissionReference pr)
|
|
{
|
|
StringBuilder builder = new StringBuilder();
|
|
builder.append(pr.getQName().toString());
|
|
builder.append(".");
|
|
builder.append(pr.getName());
|
|
return builder.toString();
|
|
}
|
|
|
|
public static class AccessPermissionComparator implements Comparator<AccessPermission>
|
|
{
|
|
|
|
/*
|
|
* (non-Javadoc)
|
|
*
|
|
* @see java.util.Comparator#compare(java.lang.Object, java.lang.Object)
|
|
*/
|
|
public int compare(AccessPermission left, AccessPermission right)
|
|
{
|
|
if (left.getPosition() != right.getPosition())
|
|
{
|
|
return right.getPosition() - left.getPosition();
|
|
}
|
|
else
|
|
{
|
|
if (left.getAccessStatus() != right.getAccessStatus())
|
|
{
|
|
return (left.getAccessStatus() == AccessStatus.DENIED) ? -1 : 1;
|
|
}
|
|
else
|
|
{
|
|
int compare = left.getAuthority().compareTo(right.getAuthority());
|
|
if (compare != 0)
|
|
{
|
|
return compare;
|
|
}
|
|
else
|
|
{
|
|
return (left.getPermission().compareTo(right.getPermission()));
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
}
|
|
|
|
}
|
|
|
|
}
|