1
0
mirror of https://github.com/pcvolkmer/onkostar-plugin-dnpm.git synced 2025-07-02 01:02:55 +00:00

Merge pull request #25 from CCC-MF/issue_24

Möglichkeit zu Berechtigungsprüfung auf Patienten- und Prozedurdaten
This commit is contained in:
2023-04-10 16:45:58 +02:00
committed by GitHub
20 changed files with 1185 additions and 1 deletions

19
pom.xml
View File

@ -14,6 +14,7 @@
<project.build.sourceEncoding>UTF-8</project.build.sourceEncoding>
<spring-version>4.3.8.RELEASE</spring-version>
<spring-security-version>4.2.2.RELEASE</spring-security-version>
</properties>
<dependencies>
@ -55,6 +56,12 @@
<version>${spring-version}</version>
<scope>provided</scope>
</dependency>
<dependency>
<groupId>org.springframework.security</groupId>
<artifactId>spring-security-core</artifactId>
<version>${spring-security-version}</version>
<scope>provided</scope>
</dependency>
<dependency>
<groupId>org.springframework.data</groupId>
<artifactId>spring-data-jpa</artifactId>
@ -94,6 +101,12 @@
<!-- Test dependencies -->
<!-- Wird nur für Unit-tests benoetigt -->
<dependency>
<groupId>org.springframework</groupId>
<artifactId>spring-test</artifactId>
<version>${spring-version}</version>
<scope>test</scope>
</dependency>
<dependency>
<groupId>org.junit.jupiter</groupId>
<artifactId>junit-jupiter-engine</artifactId>
@ -124,6 +137,12 @@
<version>4.11.0</version>
<scope>test</scope>
</dependency>
<dependency>
<groupId>org.aspectj</groupId>
<artifactId>aspectjweaver</artifactId>
<version>1.7.1</version>
<scope>test</scope>
</dependency>
<dependency>
<groupId>ca.uhn.hapi</groupId>
<artifactId>hapi-base</artifactId>

View File

@ -21,7 +21,7 @@ import javax.sql.DataSource;
* @since 0.0.2
*/
@Configuration
@ComponentScan(basePackages = "DNPM.analyzer")
@ComponentScan(basePackages = { "DNPM.analyzer", "DNPM.security" })
@EnableJpaRepositories(basePackages = "DNPM.database")
public class PluginConfiguration {

View File

@ -0,0 +1,23 @@
package DNPM.security;
import de.itc.onkostar.api.IOnkostarApi;
import de.itc.onkostar.api.Patient;
import de.itc.onkostar.api.Procedure;
import org.springframework.security.access.PermissionEvaluator;
public abstract class AbstractDelegatedPermissionEvaluator implements PermissionEvaluator {
protected static final String PATIENT = Patient.class.getSimpleName();
protected static final String PROCEDURE = Procedure.class.getSimpleName();
protected final IOnkostarApi onkostarApi;
protected final SecurityService securityService;
protected AbstractDelegatedPermissionEvaluator(final IOnkostarApi onkostarApi, final SecurityService securityService) {
this.onkostarApi = onkostarApi;
this.securityService = securityService;
}
}

View File

@ -0,0 +1,56 @@
package DNPM.security;
import org.springframework.security.access.PermissionEvaluator;
import org.springframework.security.core.Authentication;
import org.springframework.stereotype.Component;
import java.io.Serializable;
import java.util.List;
/**
* PermissionEvaluator zur Gesamtprüfung der Zugriffsberechtigung.
* Die konkrete Berechtigungsprüfung wird an die nachgelagerten PermissionEvaluatoren delegiert,
* welche jeweils einzeln dem Zugriff zustimmen müssen.
*/
@Component
public class DelegatingDataBasedPermissionEvaluator implements PermissionEvaluator {
private final List<AbstractDelegatedPermissionEvaluator> permissionEvaluators;
public DelegatingDataBasedPermissionEvaluator(final List<AbstractDelegatedPermissionEvaluator> permissionEvaluators) {
this.permissionEvaluators = permissionEvaluators;
}
/**
* Auswertung der Zugriffsberechtigung für authentifizierten Benutzer auf Zielobjekt mit angeforderter Berechtigung.
* Hierbei wird die Berechtigungsprüfung an alle nachgelagerten PermissionEvaluatoren delegiert.
* Alle müssen dem Zugriff zustimmen.
*
* @param authentication Das Authentication Objekt
* @param targetObject Das Zielobjekt
* @param permissionType Die angeforderte Berechtigung
* @return Gibt <code>true</code> zurück, wenn der Benutzer die Berechtigung hat
*/
@Override
public boolean hasPermission(Authentication authentication, Object targetObject, Object permissionType) {
return permissionEvaluators.stream()
.allMatch(permissionEvaluator -> permissionEvaluator.hasPermission(authentication, targetObject, permissionType));
}
/**
* Auswertung anhand der ID und des Namens des Zielobjekts.
* Hierbei wird die Berechtigungsprüfung an alle nachgelagerten PermissionEvaluatoren delegiert.
* Alle müssen dem Zugriff zustimmen.
*
* @param authentication Authentication-Object
* @param targetId ID des Objekts
* @param targetType Name der Zielobjektklasse
* @param permissionType Die angeforderte Berechtigung
* @return Gibt <code>true</code> zurück, wenn der Benutzer die Berechtigung hat
*/
@Override
public boolean hasPermission(Authentication authentication, Serializable targetId, String targetType, Object permissionType) {
return permissionEvaluators.stream()
.allMatch(permissionEvaluator -> permissionEvaluator.hasPermission(authentication, targetId, targetType, permissionType));
}
}

View File

@ -0,0 +1,59 @@
package DNPM.security;
import de.itc.onkostar.api.IOnkostarApi;
import de.itc.onkostar.api.Procedure;
import org.springframework.security.core.Authentication;
import org.springframework.stereotype.Component;
import java.io.Serializable;
/**
* Permission-Evaluator zur Auswertung der Berechtigung auf Objekte aufgrund der Formularberechtigung
*/
@Component
public class FormBasedPermissionEvaluator extends AbstractDelegatedPermissionEvaluator {
public FormBasedPermissionEvaluator(final IOnkostarApi onkostarApi, final SecurityService securityService) {
super(onkostarApi, securityService);
}
/**
* Auswertung der Zugriffsberechtigung für authentifizierten Benutzer auf Zielobjekt mit angeforderter Berechtigung.
* Zugriff auf Objekte vom Typ "Patient" wird immer gewährt.
*
* @param authentication Das Authentication Objekt
* @param targetObject Das Zielobjekt
* @param permissionType Die angeforderte Berechtigung
* @return Gibt <code>true</code> zurück, wenn der Benutzer die Berechtigung hat
*/
@Override
public boolean hasPermission(Authentication authentication, Object targetObject, Object permissionType) {
if (permissionType instanceof PermissionType && targetObject instanceof Procedure) {
return this.securityService.getFormNamesForPermission(authentication, (PermissionType)permissionType)
.contains(((Procedure)targetObject).getFormName());
}
return true;
}
/**
* Auswertung anhand der ID und des Namens des Zielobjekts.
* Zugriff auf Objekte vom Typ "Patient" wird immer gewährt.
*
* @param authentication Authentication-Object
* @param targetId ID des Objekts
* @param targetType Name der Zielobjektklasse
* @param permissionType Die angeforderte Berechtigung
* @return Gibt <code>true</code> zurück, wenn der Benutzer die Berechtigung hat
*/
@Override
public boolean hasPermission(Authentication authentication, Serializable targetId, String targetType, Object permissionType) {
if (permissionType instanceof PermissionType && targetId instanceof Integer && PROCEDURE.equals(targetType)) {
var procedure = this.onkostarApi.getProcedure((int)targetId);
if (null != procedure) {
return this.securityService.getFormNamesForPermission(authentication, (PermissionType) permissionType).contains(procedure.getFormName());
}
}
return true;
}
}

View File

@ -0,0 +1,51 @@
package DNPM.security;
import de.itc.onkostar.api.Procedure;
import org.aspectj.lang.JoinPoint;
import org.aspectj.lang.annotation.AfterReturning;
import org.aspectj.lang.annotation.Aspect;
import org.aspectj.lang.annotation.Before;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.springframework.security.core.context.SecurityContextHolder;
import org.springframework.stereotype.Component;
import java.util.Arrays;
@Component
@Aspect
public class FormBasedSecurityAspects {
private final Logger logger = LoggerFactory.getLogger(this.getClass());
private final FormBasedPermissionEvaluator permissionEvaluator;
public FormBasedSecurityAspects(
final FormBasedPermissionEvaluator permissionEvaluator
) {
this.permissionEvaluator = permissionEvaluator;
}
@AfterReturning(value = "@annotation(FormSecuredResult)", returning = "procedure")
public void afterProcedureFormBased(Procedure procedure) {
if (
null != procedure
&& ! permissionEvaluator.hasPermission(SecurityContextHolder.getContext().getAuthentication(), procedure, PermissionType.READ_WRITE)
) {
logger.warn("Rückgabe von Prozedur blockiert: {}", procedure.getId());
throw new IllegalSecuredObjectAccessException();
}
}
@Before(value = "@annotation(FormSecured)")
public void beforeProcedureFormBased(JoinPoint jp) {
Arrays.stream(jp.getArgs())
.filter(arg -> arg instanceof Procedure)
.forEach(procedure -> {
if (! permissionEvaluator.hasPermission(SecurityContextHolder.getContext().getAuthentication(), procedure, PermissionType.READ_WRITE)) {
logger.warn("Zugriff auf Prozedur blockiert: {}", ((Procedure)procedure).getId());
throw new IllegalSecuredObjectAccessException();
}
});
}
}

View File

@ -0,0 +1,14 @@
package DNPM.security;
import java.lang.annotation.ElementType;
import java.lang.annotation.Retention;
import java.lang.annotation.RetentionPolicy;
import java.lang.annotation.Target;
@Retention(RetentionPolicy.RUNTIME)
@Target(ElementType.METHOD)
public @interface FormSecured {
PermissionType value() default PermissionType.READ_WRITE;
}

View File

@ -0,0 +1,14 @@
package DNPM.security;
import java.lang.annotation.ElementType;
import java.lang.annotation.Retention;
import java.lang.annotation.RetentionPolicy;
import java.lang.annotation.Target;
@Retention(RetentionPolicy.RUNTIME)
@Target(ElementType.METHOD)
public @interface FormSecuredResult {
PermissionType value() default PermissionType.READ_WRITE;
}

View File

@ -0,0 +1,13 @@
package DNPM.security;
public class IllegalSecuredObjectAccessException extends RuntimeException {
public IllegalSecuredObjectAccessException() {
super();
}
public IllegalSecuredObjectAccessException(String message) {
super(message);
}
}

View File

@ -0,0 +1,6 @@
package DNPM.security;
public enum PermissionType {
READ,
READ_WRITE
}

View File

@ -0,0 +1,81 @@
package DNPM.security;
import de.itc.onkostar.api.IOnkostarApi;
import de.itc.onkostar.api.Patient;
import de.itc.onkostar.api.Procedure;
import org.springframework.security.core.Authentication;
import org.springframework.stereotype.Component;
import java.io.Serializable;
/**
* Permission-Evaluator zur Auswertung der Berechtigung auf Objekte aufgrund der Personenstammberechtigung
*/
@Component
public class PersonPoolBasedPermissionEvaluator extends AbstractDelegatedPermissionEvaluator {
public PersonPoolBasedPermissionEvaluator(final IOnkostarApi onkostarApi, final SecurityService securityService) {
super(onkostarApi, securityService);
}
/**
* Auswertung der Zugriffsberechtigung für authentifizierten Benutzer auf Zielobjekt mit angeforderter Berechtigung.
* @param authentication Das Authentication Objekt
* @param targetObject Das Zielobjekt
* @param permissionType Die angeforderte Berechtigung
* @return Gibt <code>true</code> zurück, wenn der Benutzer die Berechtigung hat
*/
@Override
public boolean hasPermission(Authentication authentication, Object targetObject, Object permissionType) {
if (permissionType instanceof PermissionType) {
if (targetObject instanceof Patient) {
return this.securityService.getPersonPoolIdsForPermission(authentication, (PermissionType)permissionType)
.contains(((Patient)targetObject).getPersonPoolCode());
} else if (targetObject instanceof Procedure) {
return this.securityService.getPersonPoolIdsForPermission(authentication, (PermissionType)permissionType)
.contains(((Procedure)targetObject).getPatient().getPersonPoolCode());
}
}
return false;
}
/**
* Auswertung anhand der ID und des Namens des Zielobjekts.
* @param authentication Authentication-Object
* @param targetId ID des Objekts
* @param targetType Name der Zielobjektklasse
* @param permissionType Die angeforderte Berechtigung
* @return Gibt <code>true</code> zurück, wenn der Benutzer die Berechtigung hat
*/
@Override
public boolean hasPermission(Authentication authentication, Serializable targetId, String targetType, Object permissionType) {
if (targetId instanceof Integer && permissionType instanceof PermissionType) {
var personPoolCode = getPersonPoolCode((int)targetId, targetType);
if (null != personPoolCode) {
return this.securityService.getPersonPoolIdsForPermission(authentication, (PermissionType) permissionType).contains(personPoolCode);
}
}
return false;
}
private String getPersonPoolCode(int id, String type) {
Patient patient = null;
if (PATIENT.equals(type)) {
patient = onkostarApi.getPatient(id);
} else if (PROCEDURE.equals(type)) {
var procedure = onkostarApi.getProcedure(id);
if (null != procedure) {
patient = procedure.getPatient();
}
}
if (null != patient) {
return patient.getPersonPoolCode();
}
return null;
}
}

View File

@ -0,0 +1,74 @@
package DNPM.security;
import de.itc.onkostar.api.Patient;
import de.itc.onkostar.api.Procedure;
import org.aspectj.lang.JoinPoint;
import org.aspectj.lang.annotation.AfterReturning;
import org.aspectj.lang.annotation.Aspect;
import org.aspectj.lang.annotation.Before;
import org.slf4j.Logger;
import org.slf4j.LoggerFactory;
import org.springframework.security.core.context.SecurityContextHolder;
import org.springframework.stereotype.Component;
import java.util.Arrays;
@Component
@Aspect
public class PersonPoolBasedSecurityAspects {
private final Logger logger = LoggerFactory.getLogger(this.getClass());
private final PersonPoolBasedPermissionEvaluator permissionEvaluator;
public PersonPoolBasedSecurityAspects(PersonPoolBasedPermissionEvaluator permissionEvaluator) {
this.permissionEvaluator = permissionEvaluator;
}
@AfterReturning(value = "@annotation(PersonPoolSecuredResult) ", returning = "patient")
public void afterPatient(Patient patient) {
if (
null != patient
&& ! permissionEvaluator.hasPermission(SecurityContextHolder.getContext().getAuthentication(), patient, PermissionType.READ_WRITE)
) {
logger.warn("Rückgabe von Patient blockiert: {}", patient.getId());
throw new IllegalSecuredObjectAccessException();
}
}
@AfterReturning(value = "@annotation(PersonPoolSecuredResult)", returning = "procedure")
public void afterProcedure(Procedure procedure) {
if (
null != procedure
&& ! permissionEvaluator.hasPermission(SecurityContextHolder.getContext().getAuthentication(), procedure, PermissionType.READ_WRITE)
) {
logger.warn("Rückgabe von Prozedur blockiert: {}", procedure.getId());
throw new IllegalSecuredObjectAccessException();
}
}
@Before(value = "@annotation(PersonPoolSecured)")
public void beforePatient(JoinPoint jp) {
Arrays.stream(jp.getArgs())
.filter(arg -> arg instanceof Patient)
.forEach(patient -> {
if (! permissionEvaluator.hasPermission(SecurityContextHolder.getContext().getAuthentication(), patient, PermissionType.READ_WRITE)) {
logger.warn("Zugriff auf Patient blockiert: {}", ((Patient)patient).getId());
throw new IllegalSecuredObjectAccessException();
}
});
}
@Before(value = "@annotation(PersonPoolSecured)")
public void beforeProcedure(JoinPoint jp) {
Arrays.stream(jp.getArgs())
.filter(arg -> arg instanceof Procedure)
.forEach(procedure -> {
if (! permissionEvaluator.hasPermission(SecurityContextHolder.getContext().getAuthentication(), procedure, PermissionType.READ_WRITE)) {
logger.warn("Zugriff auf Prozedur blockiert: {}", ((Procedure)procedure).getId());
throw new IllegalSecuredObjectAccessException();
}
});
}
}

View File

@ -0,0 +1,14 @@
package DNPM.security;
import java.lang.annotation.ElementType;
import java.lang.annotation.Retention;
import java.lang.annotation.RetentionPolicy;
import java.lang.annotation.Target;
@Retention(RetentionPolicy.RUNTIME)
@Target(ElementType.METHOD)
public @interface PersonPoolSecured {
PermissionType value() default PermissionType.READ_WRITE;
}

View File

@ -0,0 +1,14 @@
package DNPM.security;
import java.lang.annotation.ElementType;
import java.lang.annotation.Retention;
import java.lang.annotation.RetentionPolicy;
import java.lang.annotation.Target;
@Retention(RetentionPolicy.RUNTIME)
@Target(ElementType.METHOD)
public @interface PersonPoolSecuredResult {
PermissionType value() default PermissionType.READ_WRITE;
}

View File

@ -0,0 +1,60 @@
package DNPM.security;
import org.springframework.jdbc.core.JdbcTemplate;
import org.springframework.security.core.Authentication;
import org.springframework.security.core.userdetails.UserDetails;
import org.springframework.stereotype.Service;
import javax.sql.DataSource;
import java.util.List;
/**
* Service mit Methoden zum Feststellen von sicherheitsrelevanten Informationen eines Benutzers
*/
@Service
public class SecurityService {
private final JdbcTemplate jdbcTemplate;
public SecurityService(final DataSource dataSource) {
this.jdbcTemplate = new JdbcTemplate(dataSource);
}
List<String> getPersonPoolIdsForPermission(Authentication authentication, PermissionType permissionType) {
var sql = "SELECT p.kennung FROM personenstamm_zugriff " +
" JOIN usergroup u ON personenstamm_zugriff.benutzergruppe_id = u.id " +
" JOIN akteur_usergroup au ON u.id = au.usergroup_id " +
" JOIN akteur a ON au.akteur_id = a.id " +
" JOIN personenstamm p on personenstamm_zugriff.personenstamm_id = p.id " +
" WHERE a.login = ? AND a.aktiv AND a.anmelden_moeglich ";
if (PermissionType.READ_WRITE == permissionType) {
sql += " AND personenstamm_zugriff.bearbeiten ";
}
var userDetails = (UserDetails)authentication.getPrincipal();
return jdbcTemplate
.query(sql, new Object[]{userDetails.getUsername()}, (rs, rowNum) -> rs.getString("kennung"));
}
List<String> getFormNamesForPermission(Authentication authentication, PermissionType permissionType) {
var sql = "SELECT df.name FROM formular_usergroup_zugriff " +
" JOIN data_form df ON formular_usergroup_zugriff.formular_id = df.id " +
" JOIN usergroup u ON formular_usergroup_zugriff.usergroup_id = u.id " +
" JOIN akteur_usergroup au ON u.id = au.usergroup_id " +
" JOIN akteur a on au.akteur_id = a.id " +
" WHERE a.login = ? AND a.aktiv AND a.anmelden_moeglich ";
if (PermissionType.READ_WRITE == permissionType) {
sql += " AND formular_usergroup_zugriff.bearbeiten ";
}
var userDetails = (UserDetails)authentication.getPrincipal();
return jdbcTemplate
.query(sql, new Object[]{userDetails.getUsername()}, (rs, rowNum) -> rs.getString("name"));
}
}

View File

@ -0,0 +1,122 @@
package DNPM.security;
import de.itc.onkostar.api.IOnkostarApi;
import de.itc.onkostar.api.Patient;
import org.junit.jupiter.api.BeforeEach;
import org.junit.jupiter.api.Test;
import org.junit.jupiter.api.extension.ExtendWith;
import org.mockito.Mock;
import org.mockito.junit.jupiter.MockitoExtension;
import org.springframework.security.core.Authentication;
import org.springframework.security.core.GrantedAuthority;
import java.util.Collection;
import java.util.List;
import static org.assertj.core.api.Assertions.assertThat;
import static org.mockito.ArgumentMatchers.*;
import static org.mockito.Mockito.when;
@ExtendWith(MockitoExtension.class)
class DelegatingDataBasedPermissionEvaluatorTest {
private IOnkostarApi onkostarApi;
private PersonPoolBasedPermissionEvaluator personPoolBasedPermissionEvaluator;
private FormBasedPermissionEvaluator formBasedPermissionEvaluator;
private DelegatingDataBasedPermissionEvaluator delegatingDataBasedPermissionEvaluator;
@BeforeEach
void setup(
@Mock IOnkostarApi onkostarApi,
@Mock PersonPoolBasedPermissionEvaluator personPoolBasedPermissionEvaluator,
@Mock FormBasedPermissionEvaluator formBasedPermissionEvaluator
) {
this.onkostarApi = onkostarApi;
this.personPoolBasedPermissionEvaluator = personPoolBasedPermissionEvaluator;
this.formBasedPermissionEvaluator = formBasedPermissionEvaluator;
this.delegatingDataBasedPermissionEvaluator = new DelegatingDataBasedPermissionEvaluator(
List.of(personPoolBasedPermissionEvaluator, formBasedPermissionEvaluator)
);
}
@Test
void testShouldGrantPermissionIfAllDelegatedPermissionEvaluatorsGrantsAccessByObject() {
when(personPoolBasedPermissionEvaluator.hasPermission(any(), any(Patient.class), any(PermissionType.class))).thenReturn(true);
when(formBasedPermissionEvaluator.hasPermission(any(), any(Patient.class), any(PermissionType.class))).thenReturn(true);
var actual = delegatingDataBasedPermissionEvaluator.hasPermission(new DummyAuthentication(), new Patient(this.onkostarApi), PermissionType.READ);
assertThat(actual).isTrue();
}
@Test
void testShouldGrantPermissionIfAllDelegatedPermissionEvaluatorsGrantsAccessByIdAndType() {
when(personPoolBasedPermissionEvaluator.hasPermission(any(), anyInt(), anyString(), any(PermissionType.class))).thenReturn(true);
when(formBasedPermissionEvaluator.hasPermission(any(), anyInt(), anyString(), any(PermissionType.class))).thenReturn(true);
var actual = delegatingDataBasedPermissionEvaluator.hasPermission(new DummyAuthentication(), 123, "Patient", PermissionType.READ);
assertThat(actual).isTrue();
}
@Test
void testShouldDenyPermissionIfAtLeastOneDelegatedPermissionEvaluatorsDeniesAccessByObject() {
when(personPoolBasedPermissionEvaluator.hasPermission(any(), any(Patient.class), any(PermissionType.class))).thenReturn(true);
when(formBasedPermissionEvaluator.hasPermission(any(), any(Patient.class), any(PermissionType.class))).thenReturn(false);
var actual = delegatingDataBasedPermissionEvaluator.hasPermission(new DummyAuthentication(), new Patient(this.onkostarApi), PermissionType.READ);
assertThat(actual).isFalse();
}
@Test
void testShouldDenyPermissionIfAtLeastOneDelegatedPermissionEvaluatorsDeniesAccessByIdAndType() {
when(personPoolBasedPermissionEvaluator.hasPermission(any(), anyInt(), anyString(), any(PermissionType.class))).thenReturn(false);
var actual = delegatingDataBasedPermissionEvaluator.hasPermission(new DummyAuthentication(), 123, "Patient", PermissionType.READ);
assertThat(actual).isFalse();
}
}
class DummyAuthentication implements Authentication {
@Override
public String getName() {
return "dummy";
}
@Override
public Collection<? extends GrantedAuthority> getAuthorities() {
return null;
}
@Override
public Object getCredentials() {
return null;
}
@Override
public Object getDetails() {
return null;
}
@Override
public Object getPrincipal() {
return null;
}
@Override
public boolean isAuthenticated() {
return false;
}
@Override
public void setAuthenticated(boolean b) throws IllegalArgumentException {
}
}

View File

@ -0,0 +1,112 @@
package DNPM.security;
import de.itc.onkostar.api.IOnkostarApi;
import de.itc.onkostar.api.Patient;
import de.itc.onkostar.api.Procedure;
import org.junit.jupiter.api.BeforeEach;
import org.junit.jupiter.api.Test;
import org.junit.jupiter.api.extension.ExtendWith;
import org.mockito.Mock;
import org.mockito.junit.jupiter.MockitoExtension;
import org.springframework.security.core.Authentication;
import java.util.List;
import static org.assertj.core.api.Assertions.assertThat;
import static org.mockito.ArgumentMatchers.any;
import static org.mockito.ArgumentMatchers.anyInt;
import static org.mockito.Mockito.doAnswer;
import static org.mockito.Mockito.when;
@ExtendWith(MockitoExtension.class)
class FormBasedPermissionEvaluatorTest {
private IOnkostarApi onkostarApi;
private Authentication dummyAuthentication;
private SecurityService securityService;
private FormBasedPermissionEvaluator permissionEvaluator;
@BeforeEach
void setup(
@Mock IOnkostarApi onkostarApi,
@Mock SecurityService securityService,
@Mock DummyAuthentication dummyAuthentication
) {
this.onkostarApi = onkostarApi;
this.dummyAuthentication = dummyAuthentication;
this.securityService = securityService;
this.permissionEvaluator = new FormBasedPermissionEvaluator(
onkostarApi, securityService
);
}
@Test
void testShouldGrantPermissionByProcedure() {
when(securityService.getFormNamesForPermission(any(Authentication.class), any(PermissionType.class))).thenReturn(List.of("OS.Form2", "OS.Form3", "OS.Form5"));
var object = new Procedure(onkostarApi);
object.setFormName("OS.Form2");
var actual = permissionEvaluator.hasPermission(this.dummyAuthentication, object, PermissionType.READ);
assertThat(actual).isTrue();
}
@Test
void testShouldGrantPermissionByProcedureId() {
when(securityService.getFormNamesForPermission(any(Authentication.class), any(PermissionType.class))).thenReturn(List.of("OS.Form2", "OS.Form3", "OS.Form5"));
doAnswer(invocationOnMock -> {
var object = new Procedure(onkostarApi);
object.setFormName("OS.Form2");
return object;
}).when(onkostarApi).getProcedure(anyInt());
var actual = permissionEvaluator.hasPermission(this.dummyAuthentication, 123, PersonPoolBasedPermissionEvaluator.PROCEDURE, PermissionType.READ);
assertThat(actual).isTrue();
}
@Test
void testShouldDenyPermissionByProcedure() {
when(securityService.getFormNamesForPermission(any(Authentication.class), any(PermissionType.class))).thenReturn(List.of("OS.Form2", "OS.Form3", "OS.Form5"));
var object = new Procedure(onkostarApi);
object.setFormName("OS.Form1");
var actual = permissionEvaluator.hasPermission(this.dummyAuthentication, object, PermissionType.READ);
assertThat(actual).isFalse();
}
@Test
void testShouldDenyPermissionByProcedureId() {
when(securityService.getFormNamesForPermission(any(Authentication.class), any(PermissionType.class))).thenReturn(List.of("OS.Form2", "OS.Form3", "OS.Form5"));
doAnswer(invocationOnMock -> {
var object = new Procedure(onkostarApi);
object.setFormName("OS.Form1");
return object;
}).when(onkostarApi).getProcedure(anyInt());
var actual = permissionEvaluator.hasPermission(this.dummyAuthentication, 123, PersonPoolBasedPermissionEvaluator.PROCEDURE, PermissionType.READ);
assertThat(actual).isFalse();
}
@Test
void testShouldVoteForPermissionToPatient() {
var object = new Patient(onkostarApi);
object.setPersonPoolCode("Pool1");
var actual = permissionEvaluator.hasPermission(this.dummyAuthentication, object, PermissionType.READ);
assertThat(actual).isTrue();
}
@Test
void testShouldVoteForPermissionToIdOfTypeProcedure() {
var actual = permissionEvaluator.hasPermission(this.dummyAuthentication, 123, FormBasedPermissionEvaluator.PATIENT, PermissionType.READ);
assertThat(actual).isTrue();
}
}

View File

@ -0,0 +1,132 @@
package DNPM.security;
import de.itc.onkostar.api.IOnkostarApi;
import de.itc.onkostar.api.Patient;
import de.itc.onkostar.api.Procedure;
import org.junit.jupiter.api.BeforeEach;
import org.junit.jupiter.api.Test;
import org.junit.jupiter.api.extension.ExtendWith;
import org.mockito.Mock;
import org.mockito.junit.jupiter.MockitoExtension;
import org.springframework.aop.aspectj.annotation.AspectJProxyFactory;
import static org.assertj.core.api.Assertions.assertThat;
import static org.junit.jupiter.api.Assertions.assertThrows;
import static org.mockito.ArgumentMatchers.any;
import static org.mockito.Mockito.*;
@ExtendWith(MockitoExtension.class)
class FormBasedSecurityAspectsTest {
private DummyClass dummyClass;
private IOnkostarApi onkostarApi;
private FormBasedPermissionEvaluator permissionEvaluator;
@BeforeEach
void setup(
@Mock IOnkostarApi onkostarApi,
@Mock FormBasedPermissionEvaluator permissionEvaluator
) {
this.onkostarApi = onkostarApi;
this.permissionEvaluator = permissionEvaluator;
// Create proxied instance of DummyClass as done within Onkostar using Spring AOP
var dummyClass = new DummyClass(onkostarApi);
AspectJProxyFactory factory = new AspectJProxyFactory(dummyClass);
FormBasedSecurityAspects securityAspects = new FormBasedSecurityAspects(this.permissionEvaluator);
factory.addAspect(securityAspects);
this.dummyClass = factory.getProxy();
}
@Test
void testShouldAllowSecuredMethodCallWithPatientParam() {
this.dummyClass.methodWithPatientParam(new Patient(onkostarApi));
verify(onkostarApi, times(1)).savePatient(any(Patient.class));
}
@Test
void testShouldPreventSecuredMethodCallWithProcedureParam() {
when(this.permissionEvaluator.hasPermission(any(), any(Procedure.class), any(PermissionType.class)))
.thenReturn(false);
var exception = assertThrows(
Exception.class,
() -> this.dummyClass.methodWithProcedureParam(new Procedure(onkostarApi))
);
assertThat(exception).isExactlyInstanceOf(IllegalSecuredObjectAccessException.class);
}
@Test
void testShouldAllowSecuredMethodCallWithProcedureParam() throws Exception {
when(this.permissionEvaluator.hasPermission(any(), any(Procedure.class), any(PermissionType.class)))
.thenReturn(true);
this.dummyClass.methodWithProcedureParam(new Procedure(onkostarApi));
verify(onkostarApi, times(1)).saveProcedure(any(Procedure.class), anyBoolean());
}
@Test
void testShouldAllowSecuredMethodCallWithPatientReturnValue() {
var actual = this.dummyClass.methodWithPatientReturnValue(1);
assertThat(actual).isNotNull();
}
@Test
void testShouldPreventSecuredMethodCallWithProcedureReturnValue() {
when(this.permissionEvaluator.hasPermission(any(), any(Procedure.class), any(PermissionType.class)))
.thenReturn(false);
var exception = assertThrows(
Exception.class,
() -> this.dummyClass.methodWithProcedureReturnValue(1)
);
assertThat(exception).isExactlyInstanceOf(IllegalSecuredObjectAccessException.class);
}
@Test
void testShouldAllowSecuredMethodCallWithProcedureReturnValue() {
when(this.permissionEvaluator.hasPermission(any(), any(Procedure.class), any(PermissionType.class)))
.thenReturn(true);
var actual = this.dummyClass.methodWithProcedureReturnValue(1);
assertThat(actual).isNotNull();
}
private static class DummyClass {
private final IOnkostarApi onkostarApi;
DummyClass(final IOnkostarApi onkostarApi) {
this.onkostarApi = onkostarApi;
}
@FormSecured
public void methodWithPatientParam(Patient patient) {
this.onkostarApi.savePatient(patient);
}
@FormSecured
public void methodWithProcedureParam(Procedure procedure) throws Exception {
this.onkostarApi.saveProcedure(procedure, false);
}
@FormSecuredResult
public Patient methodWithPatientReturnValue(int id) {
var patient = new Patient(this.onkostarApi);
patient.setId(id);
return patient;
}
@FormSecuredResult
public Procedure methodWithProcedureReturnValue(int id) {
var procedure = new Procedure(this.onkostarApi);
procedure.setId(id);
return procedure;
}
}
}

View File

@ -0,0 +1,156 @@
package DNPM.security;
import de.itc.onkostar.api.IOnkostarApi;
import de.itc.onkostar.api.Patient;
import de.itc.onkostar.api.Procedure;
import org.junit.jupiter.api.BeforeEach;
import org.junit.jupiter.api.Test;
import org.junit.jupiter.api.extension.ExtendWith;
import org.mockito.Mock;
import org.mockito.junit.jupiter.MockitoExtension;
import org.springframework.security.core.Authentication;
import java.util.List;
import static org.assertj.core.api.Assertions.assertThat;
import static org.mockito.ArgumentMatchers.any;
import static org.mockito.ArgumentMatchers.anyInt;
import static org.mockito.Mockito.doAnswer;
import static org.mockito.Mockito.when;
@ExtendWith(MockitoExtension.class)
class PersonPoolBasedPermissionEvaluatorTest {
private IOnkostarApi onkostarApi;
private Authentication dummyAuthentication;
private PersonPoolBasedPermissionEvaluator permissionEvaluator;
@BeforeEach
void setup(
@Mock IOnkostarApi onkostarApi,
@Mock SecurityService securityService,
@Mock DummyAuthentication dummyAuthentication
) {
this.onkostarApi = onkostarApi;
this.dummyAuthentication = dummyAuthentication;
this.permissionEvaluator = new PersonPoolBasedPermissionEvaluator(
onkostarApi, securityService
);
when(securityService.getPersonPoolIdsForPermission(any(Authentication.class), any(PermissionType.class))).thenReturn(List.of("Pool2", "Pool3", "Pool5"));
}
@Test
void testShouldGrantPermissionByPatientObject() {
var object = new Patient(onkostarApi);
object.setPersonPoolCode("Pool2");
var actual = permissionEvaluator.hasPermission(this.dummyAuthentication, object, PermissionType.READ);
assertThat(actual).isTrue();
}
@Test
void testShouldGrantPermissionByPatientIdAndType() {
doAnswer(invocationOnMock -> {
var object = new Patient(onkostarApi);
object.setPersonPoolCode("Pool2");
return object;
}).when(onkostarApi).getPatient(anyInt());
var actual = permissionEvaluator.hasPermission(this.dummyAuthentication, 123, PersonPoolBasedPermissionEvaluator.PATIENT, PermissionType.READ);
assertThat(actual).isTrue();
}
@Test
void testShouldDenyPermissionByPatientObject() {
var object = new Patient(onkostarApi);
object.setPersonPoolCode("Pool1");
var actual = permissionEvaluator.hasPermission(this.dummyAuthentication, object, PermissionType.READ);
assertThat(actual).isFalse();
}
@Test
void testShouldDenyPermissionByPatientIdAndType() {
doAnswer(invocationOnMock -> {
var object = new Patient(onkostarApi);
object.setPersonPoolCode("Pool1");
return object;
}).when(onkostarApi).getPatient(anyInt());
var actual = permissionEvaluator.hasPermission(this.dummyAuthentication, 123, PersonPoolBasedPermissionEvaluator.PATIENT, PermissionType.READ);
assertThat(actual).isFalse();
}
@Test
void testShouldGrantPermissionByProcedureObject() {
var patient = new Patient(onkostarApi);
patient.setPersonPoolCode("Pool2");
var object = new Procedure(onkostarApi);
object.setFormName("OS.Form1");
object.setPatient(patient);
var actual = permissionEvaluator.hasPermission(this.dummyAuthentication, object, PermissionType.READ);
assertThat(actual).isTrue();
}
@Test
void testShouldGrantPermissionByProcedureIdAndType() {
doAnswer(invocationOnMock -> {
var patient = new Patient(onkostarApi);
patient.setPersonPoolCode("Pool2");
var object = new Procedure(onkostarApi);
object.setFormName("OS.Form1");
object.setPatient(patient);
return object;
}).when(onkostarApi).getProcedure(anyInt());
var actual = permissionEvaluator.hasPermission(this.dummyAuthentication, 456, PersonPoolBasedPermissionEvaluator.PROCEDURE, PermissionType.READ);
assertThat(actual).isTrue();
}
@Test
void testShouldDenyPermissionByProcedureObject() {
var patient = new Patient(onkostarApi);
patient.setPersonPoolCode("Pool1");
var object = new Procedure(onkostarApi);
object.setFormName("OS.Form1");
object.setPatient(patient);
var actual = permissionEvaluator.hasPermission(this.dummyAuthentication, object, PermissionType.READ);
assertThat(actual).isFalse();
}
@Test
void testShouldDenyPermissionByProcedureIdAndType() {
doAnswer(invocationOnMock -> {
var patient = new Patient(onkostarApi);
patient.setPersonPoolCode("Pool1");
var object = new Procedure(onkostarApi);
object.setFormName("OS.Form1");
object.setPatient(patient);
return object;
}).when(onkostarApi).getProcedure(anyInt());
var actual = permissionEvaluator.hasPermission(this.dummyAuthentication, 123, PersonPoolBasedPermissionEvaluator.PROCEDURE, PermissionType.READ);
assertThat(actual).isFalse();
}
}

View File

@ -0,0 +1,164 @@
package DNPM.security;
import de.itc.onkostar.api.IOnkostarApi;
import de.itc.onkostar.api.Patient;
import de.itc.onkostar.api.Procedure;
import org.junit.jupiter.api.BeforeEach;
import org.junit.jupiter.api.Test;
import org.junit.jupiter.api.extension.ExtendWith;
import org.mockito.Mock;
import org.mockito.junit.jupiter.MockitoExtension;
import org.springframework.aop.aspectj.annotation.AspectJProxyFactory;
import static org.assertj.core.api.Assertions.assertThat;
import static org.junit.jupiter.api.Assertions.assertThrows;
import static org.mockito.ArgumentMatchers.any;
import static org.mockito.Mockito.*;
@ExtendWith(MockitoExtension.class)
class PersonPoolBasedSecurityAspectsTest {
private DummyClass dummyClass;
private IOnkostarApi onkostarApi;
private PersonPoolBasedPermissionEvaluator permissionEvaluator;
@BeforeEach
void setup(
@Mock IOnkostarApi onkostarApi,
@Mock PersonPoolBasedPermissionEvaluator permissionEvaluator
) {
this.onkostarApi = onkostarApi;
this.permissionEvaluator = permissionEvaluator;
// Create proxied instance of DummyClass as done within Onkostar using Spring AOP
var dummyClass = new DummyClass(onkostarApi);
AspectJProxyFactory factory = new AspectJProxyFactory(dummyClass);
PersonPoolBasedSecurityAspects securityAspects = new PersonPoolBasedSecurityAspects(this.permissionEvaluator);
factory.addAspect(securityAspects);
this.dummyClass = factory.getProxy();
}
@Test
void testShouldPreventSecuredMethodCallWithPatientParam() {
when(this.permissionEvaluator.hasPermission(any(), any(Patient.class), any(PermissionType.class)))
.thenReturn(false);
var exception = assertThrows(
Exception.class,
() -> this.dummyClass.methodWithPatientParam(new Patient(onkostarApi))
);
assertThat(exception).isExactlyInstanceOf(IllegalSecuredObjectAccessException.class);
}
@Test
void testShouldAllowSecuredMethodCallWithPatientParam() {
when(this.permissionEvaluator.hasPermission(any(), any(Patient.class), any(PermissionType.class)))
.thenReturn(true);
this.dummyClass.methodWithPatientParam(new Patient(onkostarApi));
verify(onkostarApi, times(1)).savePatient(any(Patient.class));
}
@Test
void testShouldPreventSecuredMethodCallWithProcedureParam() {
when(this.permissionEvaluator.hasPermission(any(), any(Procedure.class), any(PermissionType.class)))
.thenReturn(false);
var exception = assertThrows(
Exception.class,
() -> this.dummyClass.methodWithProcedureParam(new Procedure(onkostarApi))
);
assertThat(exception).isExactlyInstanceOf(IllegalSecuredObjectAccessException.class);
}
@Test
void testShouldAllowSecuredMethodCallWithProcedureParam() throws Exception {
when(this.permissionEvaluator.hasPermission(any(), any(Procedure.class), any(PermissionType.class)))
.thenReturn(true);
this.dummyClass.methodWithProcedureParam(new Procedure(onkostarApi));
verify(onkostarApi, times(1)).saveProcedure(any(Procedure.class), anyBoolean());
}
@Test
void testShouldPreventSecuredMethodCallWithPatientReturnValue() {
when(this.permissionEvaluator.hasPermission(any(), any(Patient.class), any(PermissionType.class)))
.thenReturn(false);
var exception = assertThrows(
Exception.class,
() -> this.dummyClass.methodWithPatientReturnValue(1)
);
assertThat(exception).isExactlyInstanceOf(IllegalSecuredObjectAccessException.class);
}
@Test
void testShouldAllowSecuredMethodCallWithPatientReturnValue() {
when(this.permissionEvaluator.hasPermission(any(), any(Patient.class), any(PermissionType.class)))
.thenReturn(true);
var actual = this.dummyClass.methodWithPatientReturnValue(1);
assertThat(actual).isNotNull();
}
@Test
void testShouldPreventSecuredMethodCallWithProcedureReturnValue() {
when(this.permissionEvaluator.hasPermission(any(), any(Procedure.class), any(PermissionType.class)))
.thenReturn(false);
var exception = assertThrows(
Exception.class,
() -> this.dummyClass.methodWithProcedureReturnValue(1)
);
assertThat(exception).isExactlyInstanceOf(IllegalSecuredObjectAccessException.class);
}
@Test
void testShouldAllowSecuredMethodCallWithProcedureReturnValue() {
when(this.permissionEvaluator.hasPermission(any(), any(Procedure.class), any(PermissionType.class)))
.thenReturn(true);
var actual = this.dummyClass.methodWithProcedureReturnValue(1);
assertThat(actual).isNotNull();
}
private static class DummyClass {
private final IOnkostarApi onkostarApi;
DummyClass(final IOnkostarApi onkostarApi) {
this.onkostarApi = onkostarApi;
}
@PersonPoolSecured
public void methodWithPatientParam(Patient patient) {
this.onkostarApi.savePatient(patient);
}
@PersonPoolSecured
public void methodWithProcedureParam(Procedure procedure) throws Exception {
this.onkostarApi.saveProcedure(procedure, false);
}
@PersonPoolSecuredResult
public Patient methodWithPatientReturnValue(int id) {
var patient = new Patient(this.onkostarApi);
patient.setId(id);
return patient;
}
@PersonPoolSecuredResult
public Procedure methodWithProcedureReturnValue(int id) {
var procedure = new Procedure(this.onkostarApi);
procedure.setId(id);
return procedure;
}
}
}