mirror of
https://github.com/pcvolkmer/onkostar-plugin-dnpm.git
synced 2025-07-02 01:02:55 +00:00
Merge pull request #25 from CCC-MF/issue_24
Möglichkeit zu Berechtigungsprüfung auf Patienten- und Prozedurdaten
This commit is contained in:
19
pom.xml
19
pom.xml
@ -14,6 +14,7 @@
|
||||
<project.build.sourceEncoding>UTF-8</project.build.sourceEncoding>
|
||||
|
||||
<spring-version>4.3.8.RELEASE</spring-version>
|
||||
<spring-security-version>4.2.2.RELEASE</spring-security-version>
|
||||
</properties>
|
||||
|
||||
<dependencies>
|
||||
@ -55,6 +56,12 @@
|
||||
<version>${spring-version}</version>
|
||||
<scope>provided</scope>
|
||||
</dependency>
|
||||
<dependency>
|
||||
<groupId>org.springframework.security</groupId>
|
||||
<artifactId>spring-security-core</artifactId>
|
||||
<version>${spring-security-version}</version>
|
||||
<scope>provided</scope>
|
||||
</dependency>
|
||||
<dependency>
|
||||
<groupId>org.springframework.data</groupId>
|
||||
<artifactId>spring-data-jpa</artifactId>
|
||||
@ -94,6 +101,12 @@
|
||||
|
||||
<!-- Test dependencies -->
|
||||
<!-- Wird nur für Unit-tests benoetigt -->
|
||||
<dependency>
|
||||
<groupId>org.springframework</groupId>
|
||||
<artifactId>spring-test</artifactId>
|
||||
<version>${spring-version}</version>
|
||||
<scope>test</scope>
|
||||
</dependency>
|
||||
<dependency>
|
||||
<groupId>org.junit.jupiter</groupId>
|
||||
<artifactId>junit-jupiter-engine</artifactId>
|
||||
@ -124,6 +137,12 @@
|
||||
<version>4.11.0</version>
|
||||
<scope>test</scope>
|
||||
</dependency>
|
||||
<dependency>
|
||||
<groupId>org.aspectj</groupId>
|
||||
<artifactId>aspectjweaver</artifactId>
|
||||
<version>1.7.1</version>
|
||||
<scope>test</scope>
|
||||
</dependency>
|
||||
<dependency>
|
||||
<groupId>ca.uhn.hapi</groupId>
|
||||
<artifactId>hapi-base</artifactId>
|
||||
|
@ -21,7 +21,7 @@ import javax.sql.DataSource;
|
||||
* @since 0.0.2
|
||||
*/
|
||||
@Configuration
|
||||
@ComponentScan(basePackages = "DNPM.analyzer")
|
||||
@ComponentScan(basePackages = { "DNPM.analyzer", "DNPM.security" })
|
||||
@EnableJpaRepositories(basePackages = "DNPM.database")
|
||||
public class PluginConfiguration {
|
||||
|
||||
|
@ -0,0 +1,23 @@
|
||||
package DNPM.security;
|
||||
|
||||
import de.itc.onkostar.api.IOnkostarApi;
|
||||
import de.itc.onkostar.api.Patient;
|
||||
import de.itc.onkostar.api.Procedure;
|
||||
import org.springframework.security.access.PermissionEvaluator;
|
||||
|
||||
public abstract class AbstractDelegatedPermissionEvaluator implements PermissionEvaluator {
|
||||
|
||||
protected static final String PATIENT = Patient.class.getSimpleName();
|
||||
|
||||
protected static final String PROCEDURE = Procedure.class.getSimpleName();
|
||||
|
||||
protected final IOnkostarApi onkostarApi;
|
||||
|
||||
protected final SecurityService securityService;
|
||||
|
||||
protected AbstractDelegatedPermissionEvaluator(final IOnkostarApi onkostarApi, final SecurityService securityService) {
|
||||
this.onkostarApi = onkostarApi;
|
||||
this.securityService = securityService;
|
||||
}
|
||||
|
||||
}
|
@ -0,0 +1,56 @@
|
||||
package DNPM.security;
|
||||
|
||||
import org.springframework.security.access.PermissionEvaluator;
|
||||
import org.springframework.security.core.Authentication;
|
||||
import org.springframework.stereotype.Component;
|
||||
|
||||
import java.io.Serializable;
|
||||
import java.util.List;
|
||||
|
||||
/**
|
||||
* PermissionEvaluator zur Gesamtprüfung der Zugriffsberechtigung.
|
||||
* Die konkrete Berechtigungsprüfung wird an die nachgelagerten PermissionEvaluatoren delegiert,
|
||||
* welche jeweils einzeln dem Zugriff zustimmen müssen.
|
||||
*/
|
||||
@Component
|
||||
public class DelegatingDataBasedPermissionEvaluator implements PermissionEvaluator {
|
||||
|
||||
private final List<AbstractDelegatedPermissionEvaluator> permissionEvaluators;
|
||||
|
||||
public DelegatingDataBasedPermissionEvaluator(final List<AbstractDelegatedPermissionEvaluator> permissionEvaluators) {
|
||||
this.permissionEvaluators = permissionEvaluators;
|
||||
}
|
||||
|
||||
/**
|
||||
* Auswertung der Zugriffsberechtigung für authentifizierten Benutzer auf Zielobjekt mit angeforderter Berechtigung.
|
||||
* Hierbei wird die Berechtigungsprüfung an alle nachgelagerten PermissionEvaluatoren delegiert.
|
||||
* Alle müssen dem Zugriff zustimmen.
|
||||
*
|
||||
* @param authentication Das Authentication Objekt
|
||||
* @param targetObject Das Zielobjekt
|
||||
* @param permissionType Die angeforderte Berechtigung
|
||||
* @return Gibt <code>true</code> zurück, wenn der Benutzer die Berechtigung hat
|
||||
*/
|
||||
@Override
|
||||
public boolean hasPermission(Authentication authentication, Object targetObject, Object permissionType) {
|
||||
return permissionEvaluators.stream()
|
||||
.allMatch(permissionEvaluator -> permissionEvaluator.hasPermission(authentication, targetObject, permissionType));
|
||||
}
|
||||
|
||||
/**
|
||||
* Auswertung anhand der ID und des Namens des Zielobjekts.
|
||||
* Hierbei wird die Berechtigungsprüfung an alle nachgelagerten PermissionEvaluatoren delegiert.
|
||||
* Alle müssen dem Zugriff zustimmen.
|
||||
*
|
||||
* @param authentication Authentication-Object
|
||||
* @param targetId ID des Objekts
|
||||
* @param targetType Name der Zielobjektklasse
|
||||
* @param permissionType Die angeforderte Berechtigung
|
||||
* @return Gibt <code>true</code> zurück, wenn der Benutzer die Berechtigung hat
|
||||
*/
|
||||
@Override
|
||||
public boolean hasPermission(Authentication authentication, Serializable targetId, String targetType, Object permissionType) {
|
||||
return permissionEvaluators.stream()
|
||||
.allMatch(permissionEvaluator -> permissionEvaluator.hasPermission(authentication, targetId, targetType, permissionType));
|
||||
}
|
||||
}
|
@ -0,0 +1,59 @@
|
||||
package DNPM.security;
|
||||
|
||||
import de.itc.onkostar.api.IOnkostarApi;
|
||||
import de.itc.onkostar.api.Procedure;
|
||||
import org.springframework.security.core.Authentication;
|
||||
import org.springframework.stereotype.Component;
|
||||
|
||||
import java.io.Serializable;
|
||||
|
||||
/**
|
||||
* Permission-Evaluator zur Auswertung der Berechtigung auf Objekte aufgrund der Formularberechtigung
|
||||
*/
|
||||
@Component
|
||||
public class FormBasedPermissionEvaluator extends AbstractDelegatedPermissionEvaluator {
|
||||
|
||||
public FormBasedPermissionEvaluator(final IOnkostarApi onkostarApi, final SecurityService securityService) {
|
||||
super(onkostarApi, securityService);
|
||||
}
|
||||
|
||||
/**
|
||||
* Auswertung der Zugriffsberechtigung für authentifizierten Benutzer auf Zielobjekt mit angeforderter Berechtigung.
|
||||
* Zugriff auf Objekte vom Typ "Patient" wird immer gewährt.
|
||||
*
|
||||
* @param authentication Das Authentication Objekt
|
||||
* @param targetObject Das Zielobjekt
|
||||
* @param permissionType Die angeforderte Berechtigung
|
||||
* @return Gibt <code>true</code> zurück, wenn der Benutzer die Berechtigung hat
|
||||
*/
|
||||
@Override
|
||||
public boolean hasPermission(Authentication authentication, Object targetObject, Object permissionType) {
|
||||
if (permissionType instanceof PermissionType && targetObject instanceof Procedure) {
|
||||
return this.securityService.getFormNamesForPermission(authentication, (PermissionType)permissionType)
|
||||
.contains(((Procedure)targetObject).getFormName());
|
||||
}
|
||||
return true;
|
||||
}
|
||||
|
||||
/**
|
||||
* Auswertung anhand der ID und des Namens des Zielobjekts.
|
||||
* Zugriff auf Objekte vom Typ "Patient" wird immer gewährt.
|
||||
*
|
||||
* @param authentication Authentication-Object
|
||||
* @param targetId ID des Objekts
|
||||
* @param targetType Name der Zielobjektklasse
|
||||
* @param permissionType Die angeforderte Berechtigung
|
||||
* @return Gibt <code>true</code> zurück, wenn der Benutzer die Berechtigung hat
|
||||
*/
|
||||
@Override
|
||||
public boolean hasPermission(Authentication authentication, Serializable targetId, String targetType, Object permissionType) {
|
||||
if (permissionType instanceof PermissionType && targetId instanceof Integer && PROCEDURE.equals(targetType)) {
|
||||
var procedure = this.onkostarApi.getProcedure((int)targetId);
|
||||
if (null != procedure) {
|
||||
return this.securityService.getFormNamesForPermission(authentication, (PermissionType) permissionType).contains(procedure.getFormName());
|
||||
}
|
||||
}
|
||||
return true;
|
||||
}
|
||||
|
||||
}
|
51
src/main/java/DNPM/security/FormBasedSecurityAspects.java
Normal file
51
src/main/java/DNPM/security/FormBasedSecurityAspects.java
Normal file
@ -0,0 +1,51 @@
|
||||
package DNPM.security;
|
||||
|
||||
import de.itc.onkostar.api.Procedure;
|
||||
import org.aspectj.lang.JoinPoint;
|
||||
import org.aspectj.lang.annotation.AfterReturning;
|
||||
import org.aspectj.lang.annotation.Aspect;
|
||||
import org.aspectj.lang.annotation.Before;
|
||||
import org.slf4j.Logger;
|
||||
import org.slf4j.LoggerFactory;
|
||||
import org.springframework.security.core.context.SecurityContextHolder;
|
||||
import org.springframework.stereotype.Component;
|
||||
|
||||
import java.util.Arrays;
|
||||
|
||||
@Component
|
||||
@Aspect
|
||||
public class FormBasedSecurityAspects {
|
||||
|
||||
private final Logger logger = LoggerFactory.getLogger(this.getClass());
|
||||
|
||||
private final FormBasedPermissionEvaluator permissionEvaluator;
|
||||
|
||||
public FormBasedSecurityAspects(
|
||||
final FormBasedPermissionEvaluator permissionEvaluator
|
||||
) {
|
||||
this.permissionEvaluator = permissionEvaluator;
|
||||
}
|
||||
|
||||
@AfterReturning(value = "@annotation(FormSecuredResult)", returning = "procedure")
|
||||
public void afterProcedureFormBased(Procedure procedure) {
|
||||
if (
|
||||
null != procedure
|
||||
&& ! permissionEvaluator.hasPermission(SecurityContextHolder.getContext().getAuthentication(), procedure, PermissionType.READ_WRITE)
|
||||
) {
|
||||
logger.warn("Rückgabe von Prozedur blockiert: {}", procedure.getId());
|
||||
throw new IllegalSecuredObjectAccessException();
|
||||
}
|
||||
}
|
||||
|
||||
@Before(value = "@annotation(FormSecured)")
|
||||
public void beforeProcedureFormBased(JoinPoint jp) {
|
||||
Arrays.stream(jp.getArgs())
|
||||
.filter(arg -> arg instanceof Procedure)
|
||||
.forEach(procedure -> {
|
||||
if (! permissionEvaluator.hasPermission(SecurityContextHolder.getContext().getAuthentication(), procedure, PermissionType.READ_WRITE)) {
|
||||
logger.warn("Zugriff auf Prozedur blockiert: {}", ((Procedure)procedure).getId());
|
||||
throw new IllegalSecuredObjectAccessException();
|
||||
}
|
||||
});
|
||||
}
|
||||
}
|
14
src/main/java/DNPM/security/FormSecured.java
Normal file
14
src/main/java/DNPM/security/FormSecured.java
Normal file
@ -0,0 +1,14 @@
|
||||
package DNPM.security;
|
||||
|
||||
import java.lang.annotation.ElementType;
|
||||
import java.lang.annotation.Retention;
|
||||
import java.lang.annotation.RetentionPolicy;
|
||||
import java.lang.annotation.Target;
|
||||
|
||||
@Retention(RetentionPolicy.RUNTIME)
|
||||
@Target(ElementType.METHOD)
|
||||
public @interface FormSecured {
|
||||
|
||||
PermissionType value() default PermissionType.READ_WRITE;
|
||||
|
||||
}
|
14
src/main/java/DNPM/security/FormSecuredResult.java
Normal file
14
src/main/java/DNPM/security/FormSecuredResult.java
Normal file
@ -0,0 +1,14 @@
|
||||
package DNPM.security;
|
||||
|
||||
import java.lang.annotation.ElementType;
|
||||
import java.lang.annotation.Retention;
|
||||
import java.lang.annotation.RetentionPolicy;
|
||||
import java.lang.annotation.Target;
|
||||
|
||||
@Retention(RetentionPolicy.RUNTIME)
|
||||
@Target(ElementType.METHOD)
|
||||
public @interface FormSecuredResult {
|
||||
|
||||
PermissionType value() default PermissionType.READ_WRITE;
|
||||
|
||||
}
|
@ -0,0 +1,13 @@
|
||||
package DNPM.security;
|
||||
|
||||
public class IllegalSecuredObjectAccessException extends RuntimeException {
|
||||
|
||||
public IllegalSecuredObjectAccessException() {
|
||||
super();
|
||||
}
|
||||
|
||||
public IllegalSecuredObjectAccessException(String message) {
|
||||
super(message);
|
||||
}
|
||||
|
||||
}
|
6
src/main/java/DNPM/security/PermissionType.java
Normal file
6
src/main/java/DNPM/security/PermissionType.java
Normal file
@ -0,0 +1,6 @@
|
||||
package DNPM.security;
|
||||
|
||||
public enum PermissionType {
|
||||
READ,
|
||||
READ_WRITE
|
||||
}
|
@ -0,0 +1,81 @@
|
||||
package DNPM.security;
|
||||
|
||||
import de.itc.onkostar.api.IOnkostarApi;
|
||||
import de.itc.onkostar.api.Patient;
|
||||
import de.itc.onkostar.api.Procedure;
|
||||
import org.springframework.security.core.Authentication;
|
||||
import org.springframework.stereotype.Component;
|
||||
|
||||
import java.io.Serializable;
|
||||
|
||||
/**
|
||||
* Permission-Evaluator zur Auswertung der Berechtigung auf Objekte aufgrund der Personenstammberechtigung
|
||||
*/
|
||||
@Component
|
||||
public class PersonPoolBasedPermissionEvaluator extends AbstractDelegatedPermissionEvaluator {
|
||||
|
||||
public PersonPoolBasedPermissionEvaluator(final IOnkostarApi onkostarApi, final SecurityService securityService) {
|
||||
super(onkostarApi, securityService);
|
||||
}
|
||||
|
||||
/**
|
||||
* Auswertung der Zugriffsberechtigung für authentifizierten Benutzer auf Zielobjekt mit angeforderter Berechtigung.
|
||||
* @param authentication Das Authentication Objekt
|
||||
* @param targetObject Das Zielobjekt
|
||||
* @param permissionType Die angeforderte Berechtigung
|
||||
* @return Gibt <code>true</code> zurück, wenn der Benutzer die Berechtigung hat
|
||||
*/
|
||||
@Override
|
||||
public boolean hasPermission(Authentication authentication, Object targetObject, Object permissionType) {
|
||||
if (permissionType instanceof PermissionType) {
|
||||
if (targetObject instanceof Patient) {
|
||||
return this.securityService.getPersonPoolIdsForPermission(authentication, (PermissionType)permissionType)
|
||||
.contains(((Patient)targetObject).getPersonPoolCode());
|
||||
} else if (targetObject instanceof Procedure) {
|
||||
return this.securityService.getPersonPoolIdsForPermission(authentication, (PermissionType)permissionType)
|
||||
.contains(((Procedure)targetObject).getPatient().getPersonPoolCode());
|
||||
}
|
||||
}
|
||||
return false;
|
||||
}
|
||||
|
||||
/**
|
||||
* Auswertung anhand der ID und des Namens des Zielobjekts.
|
||||
* @param authentication Authentication-Object
|
||||
* @param targetId ID des Objekts
|
||||
* @param targetType Name der Zielobjektklasse
|
||||
* @param permissionType Die angeforderte Berechtigung
|
||||
* @return Gibt <code>true</code> zurück, wenn der Benutzer die Berechtigung hat
|
||||
*/
|
||||
@Override
|
||||
public boolean hasPermission(Authentication authentication, Serializable targetId, String targetType, Object permissionType) {
|
||||
if (targetId instanceof Integer && permissionType instanceof PermissionType) {
|
||||
var personPoolCode = getPersonPoolCode((int)targetId, targetType);
|
||||
if (null != personPoolCode) {
|
||||
return this.securityService.getPersonPoolIdsForPermission(authentication, (PermissionType) permissionType).contains(personPoolCode);
|
||||
}
|
||||
}
|
||||
return false;
|
||||
}
|
||||
|
||||
private String getPersonPoolCode(int id, String type) {
|
||||
Patient patient = null;
|
||||
|
||||
if (PATIENT.equals(type)) {
|
||||
patient = onkostarApi.getPatient(id);
|
||||
} else if (PROCEDURE.equals(type)) {
|
||||
var procedure = onkostarApi.getProcedure(id);
|
||||
if (null != procedure) {
|
||||
patient = procedure.getPatient();
|
||||
}
|
||||
}
|
||||
|
||||
if (null != patient) {
|
||||
return patient.getPersonPoolCode();
|
||||
}
|
||||
|
||||
return null;
|
||||
}
|
||||
|
||||
|
||||
}
|
@ -0,0 +1,74 @@
|
||||
package DNPM.security;
|
||||
|
||||
import de.itc.onkostar.api.Patient;
|
||||
import de.itc.onkostar.api.Procedure;
|
||||
import org.aspectj.lang.JoinPoint;
|
||||
import org.aspectj.lang.annotation.AfterReturning;
|
||||
import org.aspectj.lang.annotation.Aspect;
|
||||
import org.aspectj.lang.annotation.Before;
|
||||
import org.slf4j.Logger;
|
||||
import org.slf4j.LoggerFactory;
|
||||
import org.springframework.security.core.context.SecurityContextHolder;
|
||||
import org.springframework.stereotype.Component;
|
||||
|
||||
import java.util.Arrays;
|
||||
|
||||
@Component
|
||||
@Aspect
|
||||
public class PersonPoolBasedSecurityAspects {
|
||||
|
||||
private final Logger logger = LoggerFactory.getLogger(this.getClass());
|
||||
|
||||
private final PersonPoolBasedPermissionEvaluator permissionEvaluator;
|
||||
|
||||
public PersonPoolBasedSecurityAspects(PersonPoolBasedPermissionEvaluator permissionEvaluator) {
|
||||
this.permissionEvaluator = permissionEvaluator;
|
||||
}
|
||||
|
||||
@AfterReturning(value = "@annotation(PersonPoolSecuredResult) ", returning = "patient")
|
||||
public void afterPatient(Patient patient) {
|
||||
if (
|
||||
null != patient
|
||||
&& ! permissionEvaluator.hasPermission(SecurityContextHolder.getContext().getAuthentication(), patient, PermissionType.READ_WRITE)
|
||||
) {
|
||||
logger.warn("Rückgabe von Patient blockiert: {}", patient.getId());
|
||||
throw new IllegalSecuredObjectAccessException();
|
||||
}
|
||||
}
|
||||
|
||||
@AfterReturning(value = "@annotation(PersonPoolSecuredResult)", returning = "procedure")
|
||||
public void afterProcedure(Procedure procedure) {
|
||||
if (
|
||||
null != procedure
|
||||
&& ! permissionEvaluator.hasPermission(SecurityContextHolder.getContext().getAuthentication(), procedure, PermissionType.READ_WRITE)
|
||||
) {
|
||||
logger.warn("Rückgabe von Prozedur blockiert: {}", procedure.getId());
|
||||
throw new IllegalSecuredObjectAccessException();
|
||||
}
|
||||
}
|
||||
|
||||
@Before(value = "@annotation(PersonPoolSecured)")
|
||||
public void beforePatient(JoinPoint jp) {
|
||||
Arrays.stream(jp.getArgs())
|
||||
.filter(arg -> arg instanceof Patient)
|
||||
.forEach(patient -> {
|
||||
if (! permissionEvaluator.hasPermission(SecurityContextHolder.getContext().getAuthentication(), patient, PermissionType.READ_WRITE)) {
|
||||
logger.warn("Zugriff auf Patient blockiert: {}", ((Patient)patient).getId());
|
||||
throw new IllegalSecuredObjectAccessException();
|
||||
}
|
||||
});
|
||||
}
|
||||
|
||||
@Before(value = "@annotation(PersonPoolSecured)")
|
||||
public void beforeProcedure(JoinPoint jp) {
|
||||
Arrays.stream(jp.getArgs())
|
||||
.filter(arg -> arg instanceof Procedure)
|
||||
.forEach(procedure -> {
|
||||
if (! permissionEvaluator.hasPermission(SecurityContextHolder.getContext().getAuthentication(), procedure, PermissionType.READ_WRITE)) {
|
||||
logger.warn("Zugriff auf Prozedur blockiert: {}", ((Procedure)procedure).getId());
|
||||
throw new IllegalSecuredObjectAccessException();
|
||||
}
|
||||
});
|
||||
}
|
||||
|
||||
}
|
14
src/main/java/DNPM/security/PersonPoolSecured.java
Normal file
14
src/main/java/DNPM/security/PersonPoolSecured.java
Normal file
@ -0,0 +1,14 @@
|
||||
package DNPM.security;
|
||||
|
||||
import java.lang.annotation.ElementType;
|
||||
import java.lang.annotation.Retention;
|
||||
import java.lang.annotation.RetentionPolicy;
|
||||
import java.lang.annotation.Target;
|
||||
|
||||
@Retention(RetentionPolicy.RUNTIME)
|
||||
@Target(ElementType.METHOD)
|
||||
public @interface PersonPoolSecured {
|
||||
|
||||
PermissionType value() default PermissionType.READ_WRITE;
|
||||
|
||||
}
|
14
src/main/java/DNPM/security/PersonPoolSecuredResult.java
Normal file
14
src/main/java/DNPM/security/PersonPoolSecuredResult.java
Normal file
@ -0,0 +1,14 @@
|
||||
package DNPM.security;
|
||||
|
||||
import java.lang.annotation.ElementType;
|
||||
import java.lang.annotation.Retention;
|
||||
import java.lang.annotation.RetentionPolicy;
|
||||
import java.lang.annotation.Target;
|
||||
|
||||
@Retention(RetentionPolicy.RUNTIME)
|
||||
@Target(ElementType.METHOD)
|
||||
public @interface PersonPoolSecuredResult {
|
||||
|
||||
PermissionType value() default PermissionType.READ_WRITE;
|
||||
|
||||
}
|
60
src/main/java/DNPM/security/SecurityService.java
Normal file
60
src/main/java/DNPM/security/SecurityService.java
Normal file
@ -0,0 +1,60 @@
|
||||
package DNPM.security;
|
||||
|
||||
import org.springframework.jdbc.core.JdbcTemplate;
|
||||
import org.springframework.security.core.Authentication;
|
||||
import org.springframework.security.core.userdetails.UserDetails;
|
||||
import org.springframework.stereotype.Service;
|
||||
|
||||
import javax.sql.DataSource;
|
||||
import java.util.List;
|
||||
|
||||
/**
|
||||
* Service mit Methoden zum Feststellen von sicherheitsrelevanten Informationen eines Benutzers
|
||||
*/
|
||||
@Service
|
||||
public class SecurityService {
|
||||
|
||||
private final JdbcTemplate jdbcTemplate;
|
||||
|
||||
public SecurityService(final DataSource dataSource) {
|
||||
this.jdbcTemplate = new JdbcTemplate(dataSource);
|
||||
}
|
||||
|
||||
List<String> getPersonPoolIdsForPermission(Authentication authentication, PermissionType permissionType) {
|
||||
var sql = "SELECT p.kennung FROM personenstamm_zugriff " +
|
||||
" JOIN usergroup u ON personenstamm_zugriff.benutzergruppe_id = u.id " +
|
||||
" JOIN akteur_usergroup au ON u.id = au.usergroup_id " +
|
||||
" JOIN akteur a ON au.akteur_id = a.id " +
|
||||
" JOIN personenstamm p on personenstamm_zugriff.personenstamm_id = p.id " +
|
||||
" WHERE a.login = ? AND a.aktiv AND a.anmelden_moeglich ";
|
||||
|
||||
if (PermissionType.READ_WRITE == permissionType) {
|
||||
sql += " AND personenstamm_zugriff.bearbeiten ";
|
||||
}
|
||||
|
||||
var userDetails = (UserDetails)authentication.getPrincipal();
|
||||
|
||||
return jdbcTemplate
|
||||
.query(sql, new Object[]{userDetails.getUsername()}, (rs, rowNum) -> rs.getString("kennung"));
|
||||
}
|
||||
|
||||
List<String> getFormNamesForPermission(Authentication authentication, PermissionType permissionType) {
|
||||
|
||||
var sql = "SELECT df.name FROM formular_usergroup_zugriff " +
|
||||
" JOIN data_form df ON formular_usergroup_zugriff.formular_id = df.id " +
|
||||
" JOIN usergroup u ON formular_usergroup_zugriff.usergroup_id = u.id " +
|
||||
" JOIN akteur_usergroup au ON u.id = au.usergroup_id " +
|
||||
" JOIN akteur a on au.akteur_id = a.id " +
|
||||
" WHERE a.login = ? AND a.aktiv AND a.anmelden_moeglich ";
|
||||
|
||||
if (PermissionType.READ_WRITE == permissionType) {
|
||||
sql += " AND formular_usergroup_zugriff.bearbeiten ";
|
||||
}
|
||||
|
||||
var userDetails = (UserDetails)authentication.getPrincipal();
|
||||
|
||||
return jdbcTemplate
|
||||
.query(sql, new Object[]{userDetails.getUsername()}, (rs, rowNum) -> rs.getString("name"));
|
||||
}
|
||||
|
||||
}
|
@ -0,0 +1,122 @@
|
||||
package DNPM.security;
|
||||
|
||||
import de.itc.onkostar.api.IOnkostarApi;
|
||||
import de.itc.onkostar.api.Patient;
|
||||
import org.junit.jupiter.api.BeforeEach;
|
||||
import org.junit.jupiter.api.Test;
|
||||
import org.junit.jupiter.api.extension.ExtendWith;
|
||||
import org.mockito.Mock;
|
||||
import org.mockito.junit.jupiter.MockitoExtension;
|
||||
import org.springframework.security.core.Authentication;
|
||||
import org.springframework.security.core.GrantedAuthority;
|
||||
|
||||
import java.util.Collection;
|
||||
import java.util.List;
|
||||
|
||||
import static org.assertj.core.api.Assertions.assertThat;
|
||||
import static org.mockito.ArgumentMatchers.*;
|
||||
import static org.mockito.Mockito.when;
|
||||
|
||||
@ExtendWith(MockitoExtension.class)
|
||||
class DelegatingDataBasedPermissionEvaluatorTest {
|
||||
|
||||
private IOnkostarApi onkostarApi;
|
||||
|
||||
private PersonPoolBasedPermissionEvaluator personPoolBasedPermissionEvaluator;
|
||||
|
||||
private FormBasedPermissionEvaluator formBasedPermissionEvaluator;
|
||||
|
||||
private DelegatingDataBasedPermissionEvaluator delegatingDataBasedPermissionEvaluator;
|
||||
|
||||
@BeforeEach
|
||||
void setup(
|
||||
@Mock IOnkostarApi onkostarApi,
|
||||
@Mock PersonPoolBasedPermissionEvaluator personPoolBasedPermissionEvaluator,
|
||||
@Mock FormBasedPermissionEvaluator formBasedPermissionEvaluator
|
||||
) {
|
||||
this.onkostarApi = onkostarApi;
|
||||
this.personPoolBasedPermissionEvaluator = personPoolBasedPermissionEvaluator;
|
||||
this.formBasedPermissionEvaluator = formBasedPermissionEvaluator;
|
||||
|
||||
this.delegatingDataBasedPermissionEvaluator = new DelegatingDataBasedPermissionEvaluator(
|
||||
List.of(personPoolBasedPermissionEvaluator, formBasedPermissionEvaluator)
|
||||
);
|
||||
}
|
||||
|
||||
@Test
|
||||
void testShouldGrantPermissionIfAllDelegatedPermissionEvaluatorsGrantsAccessByObject() {
|
||||
when(personPoolBasedPermissionEvaluator.hasPermission(any(), any(Patient.class), any(PermissionType.class))).thenReturn(true);
|
||||
when(formBasedPermissionEvaluator.hasPermission(any(), any(Patient.class), any(PermissionType.class))).thenReturn(true);
|
||||
|
||||
var actual = delegatingDataBasedPermissionEvaluator.hasPermission(new DummyAuthentication(), new Patient(this.onkostarApi), PermissionType.READ);
|
||||
|
||||
assertThat(actual).isTrue();
|
||||
}
|
||||
|
||||
@Test
|
||||
void testShouldGrantPermissionIfAllDelegatedPermissionEvaluatorsGrantsAccessByIdAndType() {
|
||||
when(personPoolBasedPermissionEvaluator.hasPermission(any(), anyInt(), anyString(), any(PermissionType.class))).thenReturn(true);
|
||||
when(formBasedPermissionEvaluator.hasPermission(any(), anyInt(), anyString(), any(PermissionType.class))).thenReturn(true);
|
||||
|
||||
var actual = delegatingDataBasedPermissionEvaluator.hasPermission(new DummyAuthentication(), 123, "Patient", PermissionType.READ);
|
||||
|
||||
assertThat(actual).isTrue();
|
||||
}
|
||||
|
||||
@Test
|
||||
void testShouldDenyPermissionIfAtLeastOneDelegatedPermissionEvaluatorsDeniesAccessByObject() {
|
||||
when(personPoolBasedPermissionEvaluator.hasPermission(any(), any(Patient.class), any(PermissionType.class))).thenReturn(true);
|
||||
when(formBasedPermissionEvaluator.hasPermission(any(), any(Patient.class), any(PermissionType.class))).thenReturn(false);
|
||||
|
||||
var actual = delegatingDataBasedPermissionEvaluator.hasPermission(new DummyAuthentication(), new Patient(this.onkostarApi), PermissionType.READ);
|
||||
|
||||
assertThat(actual).isFalse();
|
||||
}
|
||||
|
||||
@Test
|
||||
void testShouldDenyPermissionIfAtLeastOneDelegatedPermissionEvaluatorsDeniesAccessByIdAndType() {
|
||||
when(personPoolBasedPermissionEvaluator.hasPermission(any(), anyInt(), anyString(), any(PermissionType.class))).thenReturn(false);
|
||||
|
||||
var actual = delegatingDataBasedPermissionEvaluator.hasPermission(new DummyAuthentication(), 123, "Patient", PermissionType.READ);
|
||||
|
||||
assertThat(actual).isFalse();
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
class DummyAuthentication implements Authentication {
|
||||
@Override
|
||||
public String getName() {
|
||||
return "dummy";
|
||||
}
|
||||
|
||||
@Override
|
||||
public Collection<? extends GrantedAuthority> getAuthorities() {
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Object getCredentials() {
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Object getDetails() {
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public Object getPrincipal() {
|
||||
return null;
|
||||
}
|
||||
|
||||
@Override
|
||||
public boolean isAuthenticated() {
|
||||
return false;
|
||||
}
|
||||
|
||||
@Override
|
||||
public void setAuthenticated(boolean b) throws IllegalArgumentException {
|
||||
|
||||
}
|
||||
}
|
@ -0,0 +1,112 @@
|
||||
package DNPM.security;
|
||||
|
||||
import de.itc.onkostar.api.IOnkostarApi;
|
||||
import de.itc.onkostar.api.Patient;
|
||||
import de.itc.onkostar.api.Procedure;
|
||||
import org.junit.jupiter.api.BeforeEach;
|
||||
import org.junit.jupiter.api.Test;
|
||||
import org.junit.jupiter.api.extension.ExtendWith;
|
||||
import org.mockito.Mock;
|
||||
import org.mockito.junit.jupiter.MockitoExtension;
|
||||
import org.springframework.security.core.Authentication;
|
||||
|
||||
import java.util.List;
|
||||
|
||||
import static org.assertj.core.api.Assertions.assertThat;
|
||||
import static org.mockito.ArgumentMatchers.any;
|
||||
import static org.mockito.ArgumentMatchers.anyInt;
|
||||
import static org.mockito.Mockito.doAnswer;
|
||||
import static org.mockito.Mockito.when;
|
||||
|
||||
@ExtendWith(MockitoExtension.class)
|
||||
class FormBasedPermissionEvaluatorTest {
|
||||
|
||||
private IOnkostarApi onkostarApi;
|
||||
|
||||
private Authentication dummyAuthentication;
|
||||
|
||||
private SecurityService securityService;
|
||||
|
||||
private FormBasedPermissionEvaluator permissionEvaluator;
|
||||
|
||||
@BeforeEach
|
||||
void setup(
|
||||
@Mock IOnkostarApi onkostarApi,
|
||||
@Mock SecurityService securityService,
|
||||
@Mock DummyAuthentication dummyAuthentication
|
||||
) {
|
||||
this.onkostarApi = onkostarApi;
|
||||
this.dummyAuthentication = dummyAuthentication;
|
||||
this.securityService = securityService;
|
||||
|
||||
this.permissionEvaluator = new FormBasedPermissionEvaluator(
|
||||
onkostarApi, securityService
|
||||
);
|
||||
}
|
||||
|
||||
@Test
|
||||
void testShouldGrantPermissionByProcedure() {
|
||||
when(securityService.getFormNamesForPermission(any(Authentication.class), any(PermissionType.class))).thenReturn(List.of("OS.Form2", "OS.Form3", "OS.Form5"));
|
||||
|
||||
var object = new Procedure(onkostarApi);
|
||||
object.setFormName("OS.Form2");
|
||||
|
||||
var actual = permissionEvaluator.hasPermission(this.dummyAuthentication, object, PermissionType.READ);
|
||||
assertThat(actual).isTrue();
|
||||
}
|
||||
|
||||
@Test
|
||||
void testShouldGrantPermissionByProcedureId() {
|
||||
when(securityService.getFormNamesForPermission(any(Authentication.class), any(PermissionType.class))).thenReturn(List.of("OS.Form2", "OS.Form3", "OS.Form5"));
|
||||
|
||||
doAnswer(invocationOnMock -> {
|
||||
var object = new Procedure(onkostarApi);
|
||||
object.setFormName("OS.Form2");
|
||||
return object;
|
||||
}).when(onkostarApi).getProcedure(anyInt());
|
||||
|
||||
var actual = permissionEvaluator.hasPermission(this.dummyAuthentication, 123, PersonPoolBasedPermissionEvaluator.PROCEDURE, PermissionType.READ);
|
||||
assertThat(actual).isTrue();
|
||||
}
|
||||
|
||||
@Test
|
||||
void testShouldDenyPermissionByProcedure() {
|
||||
when(securityService.getFormNamesForPermission(any(Authentication.class), any(PermissionType.class))).thenReturn(List.of("OS.Form2", "OS.Form3", "OS.Form5"));
|
||||
|
||||
var object = new Procedure(onkostarApi);
|
||||
object.setFormName("OS.Form1");
|
||||
|
||||
var actual = permissionEvaluator.hasPermission(this.dummyAuthentication, object, PermissionType.READ);
|
||||
assertThat(actual).isFalse();
|
||||
}
|
||||
|
||||
@Test
|
||||
void testShouldDenyPermissionByProcedureId() {
|
||||
when(securityService.getFormNamesForPermission(any(Authentication.class), any(PermissionType.class))).thenReturn(List.of("OS.Form2", "OS.Form3", "OS.Form5"));
|
||||
|
||||
doAnswer(invocationOnMock -> {
|
||||
var object = new Procedure(onkostarApi);
|
||||
object.setFormName("OS.Form1");
|
||||
return object;
|
||||
}).when(onkostarApi).getProcedure(anyInt());
|
||||
|
||||
var actual = permissionEvaluator.hasPermission(this.dummyAuthentication, 123, PersonPoolBasedPermissionEvaluator.PROCEDURE, PermissionType.READ);
|
||||
assertThat(actual).isFalse();
|
||||
}
|
||||
|
||||
@Test
|
||||
void testShouldVoteForPermissionToPatient() {
|
||||
var object = new Patient(onkostarApi);
|
||||
object.setPersonPoolCode("Pool1");
|
||||
|
||||
var actual = permissionEvaluator.hasPermission(this.dummyAuthentication, object, PermissionType.READ);
|
||||
assertThat(actual).isTrue();
|
||||
}
|
||||
|
||||
@Test
|
||||
void testShouldVoteForPermissionToIdOfTypeProcedure() {
|
||||
var actual = permissionEvaluator.hasPermission(this.dummyAuthentication, 123, FormBasedPermissionEvaluator.PATIENT, PermissionType.READ);
|
||||
assertThat(actual).isTrue();
|
||||
}
|
||||
|
||||
}
|
132
src/test/java/DNPM/security/FormBasedSecurityAspectsTest.java
Normal file
132
src/test/java/DNPM/security/FormBasedSecurityAspectsTest.java
Normal file
@ -0,0 +1,132 @@
|
||||
package DNPM.security;
|
||||
|
||||
import de.itc.onkostar.api.IOnkostarApi;
|
||||
import de.itc.onkostar.api.Patient;
|
||||
import de.itc.onkostar.api.Procedure;
|
||||
import org.junit.jupiter.api.BeforeEach;
|
||||
import org.junit.jupiter.api.Test;
|
||||
import org.junit.jupiter.api.extension.ExtendWith;
|
||||
import org.mockito.Mock;
|
||||
import org.mockito.junit.jupiter.MockitoExtension;
|
||||
import org.springframework.aop.aspectj.annotation.AspectJProxyFactory;
|
||||
|
||||
import static org.assertj.core.api.Assertions.assertThat;
|
||||
import static org.junit.jupiter.api.Assertions.assertThrows;
|
||||
import static org.mockito.ArgumentMatchers.any;
|
||||
import static org.mockito.Mockito.*;
|
||||
|
||||
@ExtendWith(MockitoExtension.class)
|
||||
class FormBasedSecurityAspectsTest {
|
||||
|
||||
private DummyClass dummyClass;
|
||||
|
||||
private IOnkostarApi onkostarApi;
|
||||
|
||||
private FormBasedPermissionEvaluator permissionEvaluator;
|
||||
|
||||
@BeforeEach
|
||||
void setup(
|
||||
@Mock IOnkostarApi onkostarApi,
|
||||
@Mock FormBasedPermissionEvaluator permissionEvaluator
|
||||
) {
|
||||
this.onkostarApi = onkostarApi;
|
||||
this.permissionEvaluator = permissionEvaluator;
|
||||
|
||||
// Create proxied instance of DummyClass as done within Onkostar using Spring AOP
|
||||
var dummyClass = new DummyClass(onkostarApi);
|
||||
AspectJProxyFactory factory = new AspectJProxyFactory(dummyClass);
|
||||
FormBasedSecurityAspects securityAspects = new FormBasedSecurityAspects(this.permissionEvaluator);
|
||||
factory.addAspect(securityAspects);
|
||||
this.dummyClass = factory.getProxy();
|
||||
}
|
||||
|
||||
@Test
|
||||
void testShouldAllowSecuredMethodCallWithPatientParam() {
|
||||
this.dummyClass.methodWithPatientParam(new Patient(onkostarApi));
|
||||
verify(onkostarApi, times(1)).savePatient(any(Patient.class));
|
||||
}
|
||||
|
||||
@Test
|
||||
void testShouldPreventSecuredMethodCallWithProcedureParam() {
|
||||
when(this.permissionEvaluator.hasPermission(any(), any(Procedure.class), any(PermissionType.class)))
|
||||
.thenReturn(false);
|
||||
|
||||
var exception = assertThrows(
|
||||
Exception.class,
|
||||
() -> this.dummyClass.methodWithProcedureParam(new Procedure(onkostarApi))
|
||||
);
|
||||
assertThat(exception).isExactlyInstanceOf(IllegalSecuredObjectAccessException.class);
|
||||
}
|
||||
|
||||
@Test
|
||||
void testShouldAllowSecuredMethodCallWithProcedureParam() throws Exception {
|
||||
when(this.permissionEvaluator.hasPermission(any(), any(Procedure.class), any(PermissionType.class)))
|
||||
.thenReturn(true);
|
||||
|
||||
this.dummyClass.methodWithProcedureParam(new Procedure(onkostarApi));
|
||||
|
||||
verify(onkostarApi, times(1)).saveProcedure(any(Procedure.class), anyBoolean());
|
||||
}
|
||||
|
||||
@Test
|
||||
void testShouldAllowSecuredMethodCallWithPatientReturnValue() {
|
||||
var actual = this.dummyClass.methodWithPatientReturnValue(1);
|
||||
assertThat(actual).isNotNull();
|
||||
}
|
||||
|
||||
@Test
|
||||
void testShouldPreventSecuredMethodCallWithProcedureReturnValue() {
|
||||
when(this.permissionEvaluator.hasPermission(any(), any(Procedure.class), any(PermissionType.class)))
|
||||
.thenReturn(false);
|
||||
|
||||
var exception = assertThrows(
|
||||
Exception.class,
|
||||
() -> this.dummyClass.methodWithProcedureReturnValue(1)
|
||||
);
|
||||
assertThat(exception).isExactlyInstanceOf(IllegalSecuredObjectAccessException.class);
|
||||
}
|
||||
|
||||
@Test
|
||||
void testShouldAllowSecuredMethodCallWithProcedureReturnValue() {
|
||||
when(this.permissionEvaluator.hasPermission(any(), any(Procedure.class), any(PermissionType.class)))
|
||||
.thenReturn(true);
|
||||
|
||||
var actual = this.dummyClass.methodWithProcedureReturnValue(1);
|
||||
|
||||
assertThat(actual).isNotNull();
|
||||
}
|
||||
|
||||
private static class DummyClass {
|
||||
|
||||
private final IOnkostarApi onkostarApi;
|
||||
|
||||
DummyClass(final IOnkostarApi onkostarApi) {
|
||||
this.onkostarApi = onkostarApi;
|
||||
}
|
||||
|
||||
@FormSecured
|
||||
public void methodWithPatientParam(Patient patient) {
|
||||
this.onkostarApi.savePatient(patient);
|
||||
}
|
||||
|
||||
@FormSecured
|
||||
public void methodWithProcedureParam(Procedure procedure) throws Exception {
|
||||
this.onkostarApi.saveProcedure(procedure, false);
|
||||
}
|
||||
|
||||
@FormSecuredResult
|
||||
public Patient methodWithPatientReturnValue(int id) {
|
||||
var patient = new Patient(this.onkostarApi);
|
||||
patient.setId(id);
|
||||
return patient;
|
||||
}
|
||||
|
||||
@FormSecuredResult
|
||||
public Procedure methodWithProcedureReturnValue(int id) {
|
||||
var procedure = new Procedure(this.onkostarApi);
|
||||
procedure.setId(id);
|
||||
return procedure;
|
||||
}
|
||||
}
|
||||
|
||||
}
|
@ -0,0 +1,156 @@
|
||||
package DNPM.security;
|
||||
|
||||
import de.itc.onkostar.api.IOnkostarApi;
|
||||
import de.itc.onkostar.api.Patient;
|
||||
import de.itc.onkostar.api.Procedure;
|
||||
import org.junit.jupiter.api.BeforeEach;
|
||||
import org.junit.jupiter.api.Test;
|
||||
import org.junit.jupiter.api.extension.ExtendWith;
|
||||
import org.mockito.Mock;
|
||||
import org.mockito.junit.jupiter.MockitoExtension;
|
||||
import org.springframework.security.core.Authentication;
|
||||
|
||||
import java.util.List;
|
||||
|
||||
import static org.assertj.core.api.Assertions.assertThat;
|
||||
import static org.mockito.ArgumentMatchers.any;
|
||||
import static org.mockito.ArgumentMatchers.anyInt;
|
||||
import static org.mockito.Mockito.doAnswer;
|
||||
import static org.mockito.Mockito.when;
|
||||
|
||||
@ExtendWith(MockitoExtension.class)
|
||||
class PersonPoolBasedPermissionEvaluatorTest {
|
||||
|
||||
private IOnkostarApi onkostarApi;
|
||||
|
||||
private Authentication dummyAuthentication;
|
||||
|
||||
private PersonPoolBasedPermissionEvaluator permissionEvaluator;
|
||||
|
||||
@BeforeEach
|
||||
void setup(
|
||||
@Mock IOnkostarApi onkostarApi,
|
||||
@Mock SecurityService securityService,
|
||||
@Mock DummyAuthentication dummyAuthentication
|
||||
) {
|
||||
this.onkostarApi = onkostarApi;
|
||||
this.dummyAuthentication = dummyAuthentication;
|
||||
|
||||
this.permissionEvaluator = new PersonPoolBasedPermissionEvaluator(
|
||||
onkostarApi, securityService
|
||||
);
|
||||
|
||||
when(securityService.getPersonPoolIdsForPermission(any(Authentication.class), any(PermissionType.class))).thenReturn(List.of("Pool2", "Pool3", "Pool5"));
|
||||
}
|
||||
|
||||
@Test
|
||||
void testShouldGrantPermissionByPatientObject() {
|
||||
var object = new Patient(onkostarApi);
|
||||
object.setPersonPoolCode("Pool2");
|
||||
|
||||
var actual = permissionEvaluator.hasPermission(this.dummyAuthentication, object, PermissionType.READ);
|
||||
|
||||
assertThat(actual).isTrue();
|
||||
}
|
||||
|
||||
@Test
|
||||
void testShouldGrantPermissionByPatientIdAndType() {
|
||||
doAnswer(invocationOnMock -> {
|
||||
var object = new Patient(onkostarApi);
|
||||
object.setPersonPoolCode("Pool2");
|
||||
return object;
|
||||
}).when(onkostarApi).getPatient(anyInt());
|
||||
|
||||
var actual = permissionEvaluator.hasPermission(this.dummyAuthentication, 123, PersonPoolBasedPermissionEvaluator.PATIENT, PermissionType.READ);
|
||||
|
||||
assertThat(actual).isTrue();
|
||||
}
|
||||
|
||||
@Test
|
||||
void testShouldDenyPermissionByPatientObject() {
|
||||
var object = new Patient(onkostarApi);
|
||||
object.setPersonPoolCode("Pool1");
|
||||
|
||||
var actual = permissionEvaluator.hasPermission(this.dummyAuthentication, object, PermissionType.READ);
|
||||
|
||||
assertThat(actual).isFalse();
|
||||
}
|
||||
|
||||
@Test
|
||||
void testShouldDenyPermissionByPatientIdAndType() {
|
||||
doAnswer(invocationOnMock -> {
|
||||
var object = new Patient(onkostarApi);
|
||||
object.setPersonPoolCode("Pool1");
|
||||
return object;
|
||||
}).when(onkostarApi).getPatient(anyInt());
|
||||
|
||||
var actual = permissionEvaluator.hasPermission(this.dummyAuthentication, 123, PersonPoolBasedPermissionEvaluator.PATIENT, PermissionType.READ);
|
||||
|
||||
assertThat(actual).isFalse();
|
||||
}
|
||||
|
||||
@Test
|
||||
void testShouldGrantPermissionByProcedureObject() {
|
||||
var patient = new Patient(onkostarApi);
|
||||
patient.setPersonPoolCode("Pool2");
|
||||
|
||||
var object = new Procedure(onkostarApi);
|
||||
object.setFormName("OS.Form1");
|
||||
object.setPatient(patient);
|
||||
|
||||
var actual = permissionEvaluator.hasPermission(this.dummyAuthentication, object, PermissionType.READ);
|
||||
|
||||
assertThat(actual).isTrue();
|
||||
}
|
||||
|
||||
@Test
|
||||
void testShouldGrantPermissionByProcedureIdAndType() {
|
||||
doAnswer(invocationOnMock -> {
|
||||
var patient = new Patient(onkostarApi);
|
||||
patient.setPersonPoolCode("Pool2");
|
||||
|
||||
var object = new Procedure(onkostarApi);
|
||||
object.setFormName("OS.Form1");
|
||||
object.setPatient(patient);
|
||||
|
||||
return object;
|
||||
}).when(onkostarApi).getProcedure(anyInt());
|
||||
|
||||
var actual = permissionEvaluator.hasPermission(this.dummyAuthentication, 456, PersonPoolBasedPermissionEvaluator.PROCEDURE, PermissionType.READ);
|
||||
|
||||
assertThat(actual).isTrue();
|
||||
}
|
||||
|
||||
@Test
|
||||
void testShouldDenyPermissionByProcedureObject() {
|
||||
var patient = new Patient(onkostarApi);
|
||||
patient.setPersonPoolCode("Pool1");
|
||||
|
||||
var object = new Procedure(onkostarApi);
|
||||
object.setFormName("OS.Form1");
|
||||
object.setPatient(patient);
|
||||
|
||||
var actual = permissionEvaluator.hasPermission(this.dummyAuthentication, object, PermissionType.READ);
|
||||
|
||||
assertThat(actual).isFalse();
|
||||
}
|
||||
|
||||
@Test
|
||||
void testShouldDenyPermissionByProcedureIdAndType() {
|
||||
doAnswer(invocationOnMock -> {
|
||||
var patient = new Patient(onkostarApi);
|
||||
patient.setPersonPoolCode("Pool1");
|
||||
|
||||
var object = new Procedure(onkostarApi);
|
||||
object.setFormName("OS.Form1");
|
||||
object.setPatient(patient);
|
||||
|
||||
return object;
|
||||
}).when(onkostarApi).getProcedure(anyInt());
|
||||
|
||||
var actual = permissionEvaluator.hasPermission(this.dummyAuthentication, 123, PersonPoolBasedPermissionEvaluator.PROCEDURE, PermissionType.READ);
|
||||
|
||||
assertThat(actual).isFalse();
|
||||
}
|
||||
|
||||
}
|
@ -0,0 +1,164 @@
|
||||
package DNPM.security;
|
||||
|
||||
import de.itc.onkostar.api.IOnkostarApi;
|
||||
import de.itc.onkostar.api.Patient;
|
||||
import de.itc.onkostar.api.Procedure;
|
||||
import org.junit.jupiter.api.BeforeEach;
|
||||
import org.junit.jupiter.api.Test;
|
||||
import org.junit.jupiter.api.extension.ExtendWith;
|
||||
import org.mockito.Mock;
|
||||
import org.mockito.junit.jupiter.MockitoExtension;
|
||||
import org.springframework.aop.aspectj.annotation.AspectJProxyFactory;
|
||||
|
||||
import static org.assertj.core.api.Assertions.assertThat;
|
||||
import static org.junit.jupiter.api.Assertions.assertThrows;
|
||||
import static org.mockito.ArgumentMatchers.any;
|
||||
import static org.mockito.Mockito.*;
|
||||
|
||||
@ExtendWith(MockitoExtension.class)
|
||||
class PersonPoolBasedSecurityAspectsTest {
|
||||
|
||||
private DummyClass dummyClass;
|
||||
|
||||
private IOnkostarApi onkostarApi;
|
||||
|
||||
private PersonPoolBasedPermissionEvaluator permissionEvaluator;
|
||||
|
||||
@BeforeEach
|
||||
void setup(
|
||||
@Mock IOnkostarApi onkostarApi,
|
||||
@Mock PersonPoolBasedPermissionEvaluator permissionEvaluator
|
||||
) {
|
||||
this.onkostarApi = onkostarApi;
|
||||
this.permissionEvaluator = permissionEvaluator;
|
||||
|
||||
// Create proxied instance of DummyClass as done within Onkostar using Spring AOP
|
||||
var dummyClass = new DummyClass(onkostarApi);
|
||||
AspectJProxyFactory factory = new AspectJProxyFactory(dummyClass);
|
||||
PersonPoolBasedSecurityAspects securityAspects = new PersonPoolBasedSecurityAspects(this.permissionEvaluator);
|
||||
factory.addAspect(securityAspects);
|
||||
this.dummyClass = factory.getProxy();
|
||||
}
|
||||
|
||||
@Test
|
||||
void testShouldPreventSecuredMethodCallWithPatientParam() {
|
||||
when(this.permissionEvaluator.hasPermission(any(), any(Patient.class), any(PermissionType.class)))
|
||||
.thenReturn(false);
|
||||
|
||||
var exception = assertThrows(
|
||||
Exception.class,
|
||||
() -> this.dummyClass.methodWithPatientParam(new Patient(onkostarApi))
|
||||
);
|
||||
assertThat(exception).isExactlyInstanceOf(IllegalSecuredObjectAccessException.class);
|
||||
}
|
||||
|
||||
@Test
|
||||
void testShouldAllowSecuredMethodCallWithPatientParam() {
|
||||
when(this.permissionEvaluator.hasPermission(any(), any(Patient.class), any(PermissionType.class)))
|
||||
.thenReturn(true);
|
||||
|
||||
this.dummyClass.methodWithPatientParam(new Patient(onkostarApi));
|
||||
|
||||
verify(onkostarApi, times(1)).savePatient(any(Patient.class));
|
||||
}
|
||||
|
||||
@Test
|
||||
void testShouldPreventSecuredMethodCallWithProcedureParam() {
|
||||
when(this.permissionEvaluator.hasPermission(any(), any(Procedure.class), any(PermissionType.class)))
|
||||
.thenReturn(false);
|
||||
|
||||
var exception = assertThrows(
|
||||
Exception.class,
|
||||
() -> this.dummyClass.methodWithProcedureParam(new Procedure(onkostarApi))
|
||||
);
|
||||
assertThat(exception).isExactlyInstanceOf(IllegalSecuredObjectAccessException.class);
|
||||
}
|
||||
|
||||
@Test
|
||||
void testShouldAllowSecuredMethodCallWithProcedureParam() throws Exception {
|
||||
when(this.permissionEvaluator.hasPermission(any(), any(Procedure.class), any(PermissionType.class)))
|
||||
.thenReturn(true);
|
||||
|
||||
this.dummyClass.methodWithProcedureParam(new Procedure(onkostarApi));
|
||||
|
||||
verify(onkostarApi, times(1)).saveProcedure(any(Procedure.class), anyBoolean());
|
||||
}
|
||||
|
||||
@Test
|
||||
void testShouldPreventSecuredMethodCallWithPatientReturnValue() {
|
||||
when(this.permissionEvaluator.hasPermission(any(), any(Patient.class), any(PermissionType.class)))
|
||||
.thenReturn(false);
|
||||
|
||||
var exception = assertThrows(
|
||||
Exception.class,
|
||||
() -> this.dummyClass.methodWithPatientReturnValue(1)
|
||||
);
|
||||
assertThat(exception).isExactlyInstanceOf(IllegalSecuredObjectAccessException.class);
|
||||
}
|
||||
|
||||
@Test
|
||||
void testShouldAllowSecuredMethodCallWithPatientReturnValue() {
|
||||
when(this.permissionEvaluator.hasPermission(any(), any(Patient.class), any(PermissionType.class)))
|
||||
.thenReturn(true);
|
||||
|
||||
var actual = this.dummyClass.methodWithPatientReturnValue(1);
|
||||
|
||||
assertThat(actual).isNotNull();
|
||||
}
|
||||
|
||||
@Test
|
||||
void testShouldPreventSecuredMethodCallWithProcedureReturnValue() {
|
||||
when(this.permissionEvaluator.hasPermission(any(), any(Procedure.class), any(PermissionType.class)))
|
||||
.thenReturn(false);
|
||||
|
||||
var exception = assertThrows(
|
||||
Exception.class,
|
||||
() -> this.dummyClass.methodWithProcedureReturnValue(1)
|
||||
);
|
||||
assertThat(exception).isExactlyInstanceOf(IllegalSecuredObjectAccessException.class);
|
||||
}
|
||||
|
||||
@Test
|
||||
void testShouldAllowSecuredMethodCallWithProcedureReturnValue() {
|
||||
when(this.permissionEvaluator.hasPermission(any(), any(Procedure.class), any(PermissionType.class)))
|
||||
.thenReturn(true);
|
||||
|
||||
var actual = this.dummyClass.methodWithProcedureReturnValue(1);
|
||||
|
||||
assertThat(actual).isNotNull();
|
||||
}
|
||||
|
||||
private static class DummyClass {
|
||||
|
||||
private final IOnkostarApi onkostarApi;
|
||||
|
||||
DummyClass(final IOnkostarApi onkostarApi) {
|
||||
this.onkostarApi = onkostarApi;
|
||||
}
|
||||
|
||||
@PersonPoolSecured
|
||||
public void methodWithPatientParam(Patient patient) {
|
||||
this.onkostarApi.savePatient(patient);
|
||||
}
|
||||
|
||||
@PersonPoolSecured
|
||||
public void methodWithProcedureParam(Procedure procedure) throws Exception {
|
||||
this.onkostarApi.saveProcedure(procedure, false);
|
||||
}
|
||||
|
||||
@PersonPoolSecuredResult
|
||||
public Patient methodWithPatientReturnValue(int id) {
|
||||
var patient = new Patient(this.onkostarApi);
|
||||
patient.setId(id);
|
||||
return patient;
|
||||
}
|
||||
|
||||
@PersonPoolSecuredResult
|
||||
public Procedure methodWithProcedureReturnValue(int id) {
|
||||
var procedure = new Procedure(this.onkostarApi);
|
||||
procedure.setId(id);
|
||||
return procedure;
|
||||
}
|
||||
}
|
||||
|
||||
}
|
Reference in New Issue
Block a user