package org.cagrid.gaards.dorian.service.globus; import java.io.File; import java.util.HashMap; import java.util.Map; import javax.security.auth.Subject; import javax.xml.namespace.QName; import javax.xml.rpc.handler.MessageContext; import org.globus.wsrf.config.ContainerConfig; import org.globus.wsrf.impl.security.authorization.exceptions.AuthorizationException; import org.globus.wsrf.impl.security.authorization.exceptions.CloseException; import org.globus.wsrf.impl.security.authorization.exceptions.InitializeException; import org.globus.wsrf.impl.security.authorization.exceptions.InvalidPolicyException; import org.globus.wsrf.security.authorization.PDP; import org.globus.wsrf.security.authorization.PDPConfig; import org.w3c.dom.Node; /** * DO NOT EDIT: This class is autogenerated! * * This is a PDP for use with the globus authorization callout. * This class will have a authorize method for each method on this grid service. * The method is responsible for making any authorization callouts required to satisfy the * authorization requirements placed on each method call. Each method will either return * upon a successful authorization or will throw an exception upon a failed authorization. * * @created by Introduce Toolkit version 1.4 * */ public class DorianAuthorization implements PDP { public static final String SERVICE_NAMESPACE = "http://cagrid.nci.nih.gov/Dorian"; Map authorizationClassMap = new HashMap(); public DorianAuthorization() { } protected String getServiceNamespace(){ return SERVICE_NAMESPACE; } public static String getCallerIdentity() { String caller = org.globus.wsrf.security.SecurityManager.getManager().getCaller(); if ((caller == null) || (caller.equals("<anonymous>"))) { return null; } else { return caller; } } public void authorizeGetServiceSecurityMetadata(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeRegisterWithIdP(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeFindLocalUsers(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeUpdateLocalUser(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeRemoveLocalUser(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeCreateProxy(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeGetCACertificate(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeGetTrustedIdPs(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeAddTrustedIdP(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeUpdateTrustedIdP(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeRemoveTrustedIdP(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeFindGridUsers(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeUpdateGridUser(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeRemoveGridUser(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeGetGridUserPolicies(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeAuthenticate(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeAuthenticateUser(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeAddAdmin(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeRemoveAdmin(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeGetAdmins(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeRequestHostCertificate(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeGetOwnedHostCertificates(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeApproveHostCertificate(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeFindHostCertificates(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeUpdateHostCertificateRecord(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeRenewHostCertificate(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeChangeIdPUserPassword(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeDoesLocalUserExist(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeChangeLocalUserPassword(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeUpdateUserCertificate(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeRequestUserCertificate(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeFindUserCertificates(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeRemoveUserCertificate(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizePerformFederationAudit(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizePerformIdentityProviderAudit(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeRegisterLocalUser(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeGetMultipleResourceProperties(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeGetResourceProperty(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeQueryResourceProperties(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeUserSearch(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeHostSearch(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeGetAccountProfile(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeUpdateAccountProfile(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeSetPublish(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public void authorizeGetPublish(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { } public boolean isPermitted(Subject peerSubject, MessageContext context, QName operation) throws AuthorizationException { if(!operation.getNamespaceURI().equals(getServiceNamespace())){ return false; } if(operation.getLocalPart().equals("getServiceSecurityMetadata")){ authorizeGetServiceSecurityMetadata(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("registerWithIdP")){ authorizeRegisterWithIdP(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("findLocalUsers")){ authorizeFindLocalUsers(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("updateLocalUser")){ authorizeUpdateLocalUser(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("removeLocalUser")){ authorizeRemoveLocalUser(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("createProxy")){ authorizeCreateProxy(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("getCACertificate")){ authorizeGetCACertificate(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("getTrustedIdPs")){ authorizeGetTrustedIdPs(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("addTrustedIdP")){ authorizeAddTrustedIdP(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("updateTrustedIdP")){ authorizeUpdateTrustedIdP(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("removeTrustedIdP")){ authorizeRemoveTrustedIdP(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("findGridUsers")){ authorizeFindGridUsers(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("updateGridUser")){ authorizeUpdateGridUser(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("removeGridUser")){ authorizeRemoveGridUser(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("getGridUserPolicies")){ authorizeGetGridUserPolicies(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("authenticate")){ authorizeAuthenticate(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("authenticateUser")){ authorizeAuthenticateUser(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("addAdmin")){ authorizeAddAdmin(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("removeAdmin")){ authorizeRemoveAdmin(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("getAdmins")){ authorizeGetAdmins(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("requestHostCertificate")){ authorizeRequestHostCertificate(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("getOwnedHostCertificates")){ authorizeGetOwnedHostCertificates(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("approveHostCertificate")){ authorizeApproveHostCertificate(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("findHostCertificates")){ authorizeFindHostCertificates(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("updateHostCertificateRecord")){ authorizeUpdateHostCertificateRecord(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("renewHostCertificate")){ authorizeRenewHostCertificate(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("changeIdPUserPassword")){ authorizeChangeIdPUserPassword(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("doesLocalUserExist")){ authorizeDoesLocalUserExist(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("changeLocalUserPassword")){ authorizeChangeLocalUserPassword(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("updateUserCertificate")){ authorizeUpdateUserCertificate(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("requestUserCertificate")){ authorizeRequestUserCertificate(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("findUserCertificates")){ authorizeFindUserCertificates(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("removeUserCertificate")){ authorizeRemoveUserCertificate(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("performFederationAudit")){ authorizePerformFederationAudit(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("performIdentityProviderAudit")){ authorizePerformIdentityProviderAudit(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("registerLocalUser")){ authorizeRegisterLocalUser(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("getMultipleResourceProperties")){ authorizeGetMultipleResourceProperties(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("getResourceProperty")){ authorizeGetResourceProperty(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("queryResourceProperties")){ authorizeQueryResourceProperties(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("userSearch")){ authorizeUserSearch(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("hostSearch")){ authorizeHostSearch(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("getAccountProfile")){ authorizeGetAccountProfile(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("updateAccountProfile")){ authorizeUpdateAccountProfile(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("setPublish")){ authorizeSetPublish(peerSubject, context, operation); return true; } else if(operation.getLocalPart().equals("getPublish")){ authorizeGetPublish(peerSubject, context, operation); return true; } return false; } public Node getPolicy(Node query) throws InvalidPolicyException { return null; } public String[] getPolicyNames() { return null; } public Node setPolicy(Node policy) throws InvalidPolicyException { return null; } public void close() throws CloseException { } public void initialize(PDPConfig config, String name, String id) throws InitializeException { try{ String serviceName = (String)config.getProperty(name, "serviceName"); String etcPath = ContainerConfig.getBaseDirectory() + File.separator + (String)config.getProperty(name, "etcDirectoryPath"); } catch (Exception e){ throw new InitializeException(e.getMessage(),e); } } }