org.dspace.embargo.DefaultEmbargoSetter Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of dspace-api Show documentation
Show all versions of dspace-api Show documentation
DSpace core data model and service APIs.
/**
* The contents of this file are subject to the license and copyright
* detailed in the LICENSE and NOTICE files at the root of the source
* tree and available online at
*
* http://www.dspace.org/license/
*/
package org.dspace.embargo;
import java.io.IOException;
import java.sql.SQLException;
import java.util.Date;
import java.util.List;
import org.apache.commons.lang3.StringUtils;
import org.dspace.authorize.AuthorizeException;
import org.dspace.authorize.ResourcePolicy;
import org.dspace.authorize.factory.AuthorizeServiceFactory;
import org.dspace.authorize.service.AuthorizeService;
import org.dspace.authorize.service.ResourcePolicyService;
import org.dspace.content.Bitstream;
import org.dspace.content.Bundle;
import org.dspace.content.Collection;
import org.dspace.content.DCDate;
import org.dspace.content.DSpaceObject;
import org.dspace.content.Item;
import org.dspace.core.Constants;
import org.dspace.core.Context;
import org.dspace.embargo.factory.EmbargoServiceFactory;
import org.dspace.embargo.service.EmbargoService;
import org.dspace.eperson.Group;
import org.dspace.eperson.factory.EPersonServiceFactory;
import org.dspace.license.CreativeCommonsServiceImpl;
import org.dspace.services.factory.DSpaceServicesFactory;
/**
* Default plugin implementation of the embargo setting function.
* The parseTerms() provides only very rudimentary terms logic - entry
* of a configurable string (in terms field) for 'unlimited' embargo, otherwise
* a standard ISO 8601 (yyyy-mm-dd) date is assumed. Users are encouraged
* to override this method for enhanced functionality.
*
* @author Larry Stone
* @author Richard Rodgers
*/
public class DefaultEmbargoSetter implements EmbargoSetter {
protected AuthorizeService authorizeService;
protected ResourcePolicyService resourcePolicyService;
public DefaultEmbargoSetter() {
super();
}
/**
* Parse the terms into a definite date. Terms are expected to consist of
* either: a token (value configured in 'embargo.terms.open' property) to indicate
* indefinite embargo, or a literal lift date formatted in ISO 8601 format (yyyy-mm-dd)
*
* @param context the DSpace context
* @param item the item to embargo
* @param terms the embargo terms
* @return parsed date in DCDate format
*/
@Override
public DCDate parseTerms(Context context, Item item, String terms)
throws SQLException, AuthorizeException {
String termsOpen = DSpaceServicesFactory.getInstance().getConfigurationService()
.getProperty("embargo.terms.open");
if (terms != null && terms.length() > 0) {
if (termsOpen.equals(terms)) {
return EmbargoService.FOREVER;
} else {
return new DCDate(terms);
}
}
return null;
}
/**
* Enforce embargo by turning off all read access to bitstreams in
* this Item.
*
* @param context the DSpace context
* @param item the item to embargo
*/
@Override
public void setEmbargo(Context context, Item item)
throws SQLException, AuthorizeException {
DCDate liftDate = EmbargoServiceFactory.getInstance().getEmbargoService().getEmbargoTermsAsDate(context, item);
for (Bundle bn : item.getBundles()) {
// Skip the LICENSE and METADATA bundles, they stay world-readable
String bnn = bn.getName();
if (!(bnn.equals(Constants.LICENSE_BUNDLE_NAME) || bnn.equals(Constants.METADATA_BUNDLE_NAME) || bnn
.equals(CreativeCommonsServiceImpl.CC_BUNDLE_NAME))) {
//AuthorizeManager.removePoliciesActionFilter(context, bn, Constants.READ);
generatePolicies(context, liftDate.toDate(), null, bn, item.getOwningCollection());
for (Bitstream bs : bn.getBitstreams()) {
//AuthorizeManager.removePoliciesActionFilter(context, bs, Constants.READ);
generatePolicies(context, liftDate.toDate(), null, bs, item.getOwningCollection());
}
}
}
}
protected void generatePolicies(Context context, Date embargoDate,
String reason, DSpaceObject dso, Collection owningCollection)
throws SQLException, AuthorizeException {
// add only embargo policy
if (embargoDate != null) {
List authorizedGroups = getAuthorizeService()
.getAuthorizedGroups(context, owningCollection, Constants.DEFAULT_ITEM_READ);
// look for anonymous
boolean isAnonymousInPlace = false;
for (Group g : authorizedGroups) {
if (StringUtils.equals(g.getName(), Group.ANONYMOUS)) {
isAnonymousInPlace = true;
}
}
if (!isAnonymousInPlace) {
// add policies for all the groups
for (Group g : authorizedGroups) {
ResourcePolicy rp = getAuthorizeService()
.createOrModifyPolicy(null, context, null, g, null, embargoDate,
Constants.READ, reason, dso);
if (rp != null) {
getResourcePolicyService().update(context, rp);
}
}
} else {
// add policy just for anonymous
ResourcePolicy rp = getAuthorizeService()
.createOrModifyPolicy(null, context, null,
EPersonServiceFactory.getInstance()
.getGroupService()
.findByName(context, Group.ANONYMOUS),
null, embargoDate, Constants.READ, reason, dso);
if (rp != null) {
getResourcePolicyService().update(context, rp);
}
}
}
}
/**
* Check that embargo is properly set on Item: no read access to bitstreams.
*
* @param context the DSpace context
* @param item the item to embargo
*/
@Override
public void checkEmbargo(Context context, Item item)
throws SQLException, AuthorizeException, IOException {
for (Bundle bn : item.getBundles()) {
// Skip the LICENSE and METADATA bundles, they stay world-readable
String bnn = bn.getName();
if (!(bnn.equals(Constants.LICENSE_BUNDLE_NAME) || bnn.equals(Constants.METADATA_BUNDLE_NAME) || bnn
.equals(CreativeCommonsServiceImpl.CC_BUNDLE_NAME))) {
// don't report on "TEXT" or "THUMBNAIL" bundles; those
// can have READ long as the bitstreams in them do not.
if (!(bnn.equals("TEXT") || bnn.equals("THUMBNAIL"))) {
// check for ANY read policies and report them:
for (ResourcePolicy rp : getAuthorizeService()
.getPoliciesActionFilter(context, bn, Constants.READ)) {
if (rp.getStartDate() == null) {
System.out.println("CHECK WARNING: Item " + item.getHandle() + ", Bundle " + bn
.getName() + " allows READ by " +
((rp.getEPerson() != null) ? "Group " + rp.getGroup().getName() :
"EPerson " + rp.getEPerson().getFullName()));
}
}
}
for (Bitstream bs : bn.getBitstreams()) {
for (ResourcePolicy rp : getAuthorizeService()
.getPoliciesActionFilter(context, bs, Constants.READ)) {
if (rp.getStartDate() == null) {
System.out.println("CHECK WARNING: Item " + item.getHandle() + ", Bitstream " + bs
.getName() + " (in Bundle " + bn.getName() + ") allows READ by " +
((rp.getEPerson() != null) ? "Group " + rp.getGroup().getName() :
"EPerson " + rp.getEPerson().getFullName()));
}
}
}
}
}
}
private AuthorizeService getAuthorizeService() {
if (authorizeService == null) {
authorizeService = AuthorizeServiceFactory.getInstance().getAuthorizeService();
}
return authorizeService;
}
private ResourcePolicyService getResourcePolicyService() {
if (resourcePolicyService == null) {
resourcePolicyService = AuthorizeServiceFactory.getInstance().getResourcePolicyService();
}
return resourcePolicyService;
}
}
© 2015 - 2024 Weber Informatics LLC | Privacy Policy