/**
* Copyright (c) Istituto Nazionale di Fisica Nucleare (INFN). 2006-2016
*
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package org.glite.security.voms.admin.view.actions.aup;
import org.apache.struts2.convention.annotation.InterceptorRef;
import org.apache.struts2.convention.annotation.Result;
import org.apache.struts2.convention.annotation.Results;
import org.glite.security.voms.admin.configuration.VOMSConfiguration;
import org.glite.security.voms.admin.configuration.VOMSConfigurationConstants;
import org.glite.security.voms.admin.event.EventManager;
import org.glite.security.voms.admin.event.user.aup.UserSignedAUPEvent;
import org.glite.security.voms.admin.operations.CurrentAdmin;
import org.glite.security.voms.admin.persistence.dao.VOMSUserDAO;
import org.glite.security.voms.admin.persistence.dao.generic.AUPDAO;
import org.glite.security.voms.admin.persistence.dao.generic.DAOFactory;
import org.glite.security.voms.admin.persistence.model.AUP;
import org.glite.security.voms.admin.persistence.model.VOMSUser;
import org.glite.security.voms.admin.view.actions.BaseAction;
import com.opensymphony.xwork2.ModelDriven;
import com.opensymphony.xwork2.Preparable;
import com.opensymphony.xwork2.validator.annotations.RegexFieldValidator;
import com.opensymphony.xwork2.validator.annotations.RequiredFieldValidator;
import com.opensymphony.xwork2.validator.annotations.ValidatorType;
@Results({ @Result(name = BaseAction.INPUT, location = "signAup"),
@Result(name = BaseAction.SUCCESS, location = "/home/login.action",
type = "redirect") })
@InterceptorRef(value = "authenticatedStack",
params = { "token.includeMethods", "execute" })
public class SignAction extends BaseAction
implements ModelDriven<AUP>, Preparable {
/**
*
*/
private static final long serialVersionUID = 1L;
Long aupId;
String aupAccepted;
AUP aup;
@Override
public void validate() {
super.validate();
VOMSUser u = CurrentAdmin.instance()
.getVoUser();
if (registrationDisabled()) {
addActionError("Registration is disabled for this VO");
}
if (u == null) {
addActionError(
"Current authenticated client is not a member of the VO and, as such, cannot be entitled to sign AUP for the VO.");
}
if (aupAccepted == null || !aupAccepted.equals("true")) {
addFieldError("aupAccepted",
"You have to accept the terms of the AUP to proceed!");
}
}
public boolean registrationDisabled() {
boolean registrationEnabled = VOMSConfiguration.instance()
.getBoolean(VOMSConfigurationConstants.REGISTRATION_SERVICE_ENABLED,
true);
boolean readOnly = VOMSConfiguration.instance()
.getBoolean(VOMSConfigurationConstants.READONLY, false);
return (readOnly || !registrationEnabled);
}
@Override
public String execute() throws Exception {
VOMSUser u = CurrentAdmin.instance()
.getVoUser();
VOMSUserDAO.instance()
.signAUP(u, aup);
EventManager.instance()
.dispatch(new UserSignedAUPEvent(u, aup));
return SUCCESS;
}
public AUP getModel() {
return aup;
}
public Long getAupId() {
return aupId;
}
public void setAupId(Long aupId) {
this.aupId = aupId;
}
public void prepare() throws Exception {
if (aup == null) {
AUPDAO dao = DAOFactory.instance()
.getAUPDAO();
aup = dao.getVOAUP();
}
}
@RequiredFieldValidator(type = ValidatorType.FIELD,
message = "You must sign the AUP.")
@RegexFieldValidator(type = ValidatorType.FIELD, regex = "^true$",
message = "You must accept the terms of the AUP to proceed")
public String getAupAccepted() {
return aupAccepted;
}
public void setAupAccepted(String aupAccepted) {
this.aupAccepted = aupAccepted;
}
}