/*
* Copyright (c) 2010 Lockheed Martin Corporation
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.eurekastreams.server.action.authorization;
import org.eurekastreams.commons.actions.AuthorizationStrategy;
import org.eurekastreams.commons.actions.context.PrincipalActionContext;
import org.eurekastreams.commons.exceptions.AuthorizationException;
import org.eurekastreams.server.action.request.transformer.RequestTransformer;
import org.eurekastreams.server.persistence.mappers.GetAllPersonIdsWhoHaveGroupCoordinatorAccess;
/**
* Authorization strategy for determining if current user has group coordinator permissions anywhere up the tree from a
* group (inclusive).
*
*/
// TODO: This and CurrenUserOrgCooridinatorRecursivelyAuthorization are VERY similar, if the permission checkers
// were refactored to have a common interface with "hasCoordinatorAccessRecursively(personId, entityId)" method, they
// could be collapsed into the same authorization strategy, and permission checker could be passed in and handled
// generically just like RequestTransformer is now.
public class CurrentUserGroupCoordinatorRecursivelyAuthorization implements
AuthorizationStrategy<PrincipalActionContext>
{
/**
* Transform org id from request.
*/
private RequestTransformer groupIdtransformer;
/**
* Mapper to determine if a user has access to update a group.
*/
private GetAllPersonIdsWhoHaveGroupCoordinatorAccess groupPermissionsChecker;
/**
* Constructor.
*
* @param inOrgIdtransformer
* Transform org id from request.
* @param inGroupPermissionsChecker
* Mapper to determine if a user has access to update a group.
*/
public CurrentUserGroupCoordinatorRecursivelyAuthorization(final RequestTransformer inOrgIdtransformer,
final GetAllPersonIdsWhoHaveGroupCoordinatorAccess inGroupPermissionsChecker)
{
groupIdtransformer = inOrgIdtransformer;
groupPermissionsChecker = inGroupPermissionsChecker;
}
/**
* Determine if current user is a org coordinator recursively.
*
* @param inActionContext
* {@link PrincipalActionContext}.
*/
@Override
public void authorize(final PrincipalActionContext inActionContext)
{
Long groupId = Long.valueOf((String) groupIdtransformer.transform(inActionContext));
Long personId = inActionContext.getPrincipal().getId();
if (!groupPermissionsChecker.hasGroupCoordinatorAccessRecursively(personId, groupId))
{
// doesn't have permissions
throw new AuthorizationException("Insufficient permissions to update group.");
}
}
}