Skip to main content

Notice: this Wiki will be going read only early in 2024 and edits will no longer be possible. Please see: https://gitlab.eclipse.org/eclipsefdn/helpdesk/-/wikis/Wiki-shutdown-plan for the plan.

Jump to: navigation, search

Scout/Tutorial/3.8/Minicrm/Permissions

< Scout‎ | Tutorial‎ | 3.8‎ | Minicrm
Revision as of 11:30, 24 October 2012 by Asc.bsiag.com (Talk | contribs) (Identifying Users)

The Scout documentation has been moved to https://eclipsescout.github.io/.

Note.png
Scout Tutorial
Permissions are created for you in the background by the SDK as you build your application, but they don't seem to have any effects. That's because by default, you're using the "anonymous" security filter and because you're being granted the "all" permission. This chapter shows you how to change that.
This page is an optional addition to the Minicrm Step-by-Step Tutorial and uses it as a starting point.


What is this chapter about?

This chapter is about authorization and authentication.

When creating forms and table pages, the wizards have always created Permission classes in the background:

  • CreateCompanyPermission
  • ReadCompanyPermission
  • UpdateCompanyPermission
  • DeleteCompanyPermission (actually, you will have to create this permission yourself if you implement a delete menu)

We want to create an Administration View where Users get assigned Roles. These Roles have have Permissions. When a user logs in, the appropriate Permissions are loaded.

For this to work, users must be authenticated. We'll add a SecurityFilter to handle this.

This chapter assumes that you're pretty proficient at creating tables, forms and services. No more hand-holding. :)

Database

The Apache Derby example database already contains the following tables:

ROLE       ROLE_PERMISSION  USER_ROLE
---------  ---------------  ---------
ROLE_NR    ROLE_NR          USER_NR
NAME       PERMISSION_NAME  ROLE_NR

The PERSON table has a USERNAME column.

Let us create two roles before we get started:

INSERT INTO minicrm.ROLE (role_nr, name) VALUES (1, 'Administrator');
INSERT INTO minicrm.ROLE (role_nr, name) VALUES (2, 'Standard');

If you want to take a look at the database using a command line tool, check this section of the tutorial.

Roles

Create a new Lookup Call RoleLookupCall.

The RoleLookupService uses this statement:

    return "" +
        "SELECT  ROLE_NR, " +
        "        NAME " +
        "FROM    ROLE " +
        "WHERE   1=1 " +
        "<key>   AND ROLE_NR = :key </key> " +
        "<text>  AND UPPER(NAME) LIKE UPPER(:text||'%') </text> " +
        "<all> </all> ";

Person Form

Create a Person Form and a Person Process Service to create and edit persons. Make sure you use the same class names if you want to copy and paste the SQL statements later in this section.

Label Class Name Column Name Type
Name NameField LAST_NAME String
First Name FirstNameField FIRST_NAME
Employer EmployerField COMPANY_NR SmartField (CompanyLookupCall)
Username UsernameField USERNAME String
Roles RolesField USER_ROLE.ROLE_NR Listview (RoleLookupCall, Grid H 4)

Menus

Add a "New Person..." and a "Edit Person..." menu to the PersonTablePage.

@Override
protected void execAction() throws ProcessingException {
  PersonForm form = new PersonForm();
  form.startNew();
  form.waitFor();
  if (form.isFormStored()) {
    reloadPage();
  }
}
@Override
public void execAction() throws ProcessingException {
  PersonForm form = new PersonForm();
  form.setPersonNr(getPersonNrColumn().getSelectedValue());
  form.startModify();
  form.waitFor();
 
  if (form.isFormStored()) {
    reloadPage();
  }
}

Process Service

Here are the SQL statements you will need.

Creation:

SQL.selectInto("" +
    "SELECT MAX(PERSON_NR)+1 " +
    "FROM   PERSON " +
    "INTO   :personNr"
    , formData);
 
SQL.insert("" +
    "INSERT INTO PERSON (PERSON_NR, LAST_NAME, FIRST_NAME, COMPANY_NR, USERNAME) " +
    "VALUES (:personNr, :name, :firstName, :employer, :username)"
    , formData);
 
SQL.insert("" +
    "INSERT INTO USER_ROLE (USER_NR, ROLE_NR) " +
    "VALUES (:personNr, :{roles})"
    , formData);

Loading:

SQL.selectInto("" +
    "SELECT LAST_NAME, " +
    "       FIRST_NAME, " +
    "       COMPANY_NR, " +
    "       USERNAME " +
    "FROM   PERSON " +
    "WHERE  PERSON_NR = :personNr " +
    "INTO   :name, " +
    "       :firstName, " +
    "       :employer, " +
    "       :username"
    , formData);
 
SQL.select("" +
    "SELECT ROLE_NR " +
    "FROM USER_ROLE " +
    "WHERE USER_NR = :personNr " +
    "INTO :roles"
    , formData);

Updating:

SQL.update("" +
    "UPDATE PERSON SET" +
    "       LAST_NAME = :name, " +
    "       FIRST_NAME = :firstName, " +
    "       COMPANY_NR = :employer, " +
    "       USERNAME = :username " +
    "WHERE  PERSON_NR = :personNr"
    , formData);
 
SQL.delete("" +
    "DELETE FROM USER_ROLE " +
    "WHERE  USER_NR = :personNr "
    , formData);
 
SQL.insert("" +
    "INSERT INTO USER_ROLE (USER_NR, ROLE_NR) " +
    "VALUES (:personNr, :{roles})"
    , formData);

Screenshot

If you're working in a multilingual environment, this is what it might look like:

Personen.png

Administration View

Create the following outline on the client side:

Administration Outline
 │
 ├─Role Table Page
 │  │
 │  └─Permission Table Page
 │
 └─Permissions Table Page

Additional table pages might be useful: which roles use a particular permission? which users have a particular role? These are left as an exercise for the reader.

Permission Table Page and Outline Service

We'll be using this table in two places, thus we need a variable for the role (RoleNr).

If a role is provided, we need a service on the server side to provide these. Create a new outline service (AdministrationOutlineService) with an operation to get all the roles (getPermissionTableData) with a single argument of type Long (roleNr).

@Override
public Object[][] getPermissionTableData(Long roleNr) throws ProcessingException {
  return SQL.select("" +
      "SELECT PERMISSION_NAME " +
      "FROM ROLE_PERMISSION " +
      "WHERE ROLE_NR = :roleNr "
      , new NVPair("roleNr", roleNr));
}

If no role is provided, we list all the permissions. These are all available on the client. We don't need service on the server side to fetch them. Thus, on the client side, things look a bit different. Here's execLoadTableData for the newly created PermissionTablePage.

@Override
protected Object[][] execLoadTableData(SearchFilter filter) throws ProcessingException {
  if (getRoleNr() == null) {
    ArrayList<String> rows = new ArrayList<String>();
    BundleClassDescriptor[] permissions = SERVICES.getService(IPermissionService.class).getAllPermissionClasses();
    for (int i = 0; i < permissions.length; i++) {
      if (permissions[i].getBundleSymbolicName().contains("minicrm")) {
	rows.add(permissions[i].getSimpleClassName());
      }
      else {
	// Skip bookmark permissions and other permissions that are not specific to our application
      }
    }
    Collections.sort(rows);
    Object[][] data = new Object[rows.size()][1];
    for (int i = 0; i < rows.size(); i++) {
      data[i][0] = rows.get(i);
    }
    return data;
  }
  else {
    return SERVICES.getService(IAdministrationOutlineService.class).getPermissionTableData(getRoleNr());
  }
}

Don't forget to create a column for your table page!

This is what you'd like to see:

Minicrm Administration Permissions.png

(Using the Swing client because we will have to create additional menus to switch outlines when using SWT.)

Role Table Page and Outline Service

Create a new table page in the administration outline (RoleTablePage) with two columns (non-displayable RoleNr of type Long and a String column called Role).

If you want to change the order of the child tapes, edit the execCreateChildPages method of the AdministrationOutline.

Add a new service operation to the AdministrationOutlineService called getRoleTableData. This one is very simple:

@Override
public Object[][] getRoleTableData() throws ProcessingException {
  return SQL.select("" +
      "SELECT ROLE_NR, NAME " +
      "FROM ROLE");
}

Use it on the execLoadTableData operation of the table page:

@Override
protected Object[][] execLoadTableData(SearchFilter filter) throws ProcessingException {
  return SERVICES.getService(IAdministrationOutlineService.class).getRoleTableData();
}

Add the PermissionTablePage as a child to the RoleTablePage. Note how the SDK already guessed that you will want to pass the primary of the current row to the child page:

@Override
protected IPage execCreateChildPage(ITableRow row) throws ProcessingException {
  PermissionTablePage childPage = new PermissionTablePage();
  childPage.setRoleNr(getTable().getRoleNrColumn().getValue(row));
  return childPage;
}

If everything worked as intended, this is how it should look:

Minicrm Administration Roles.png

No data is visible because the permissions haven't been assigned to roles, yet. This will be our next task.

Assigning Permissions to Roles

We will create a menu which calls a tiny form to assign one or more permissions to a role. The form will contain nothing but a smart field with roles.

Let's start with the form.

Create a new form called AssignToRoleForm; do not create am Id (no AssignToRoleNr). On the second page of the wizard, get rid of the ModifyHandler, the ReadAssignToRolePermission and the UpdateAssignToRolePermission.

Add a smart field RoleField using LookupCall RoleLookupCall.

Add a variable of type String called Permission. Now do something which the SDK doesn't do for you: change the type of m_permission from String to String[] and change getPermission and setPermission to match.

Switch to the AssignToRoleProcessService and remove the load and store operations. (You may have to remove them from the interface IAssignToRoleProcessService as well.)

For the moment, there is nothing to do for the prepareCreate operation. For the create operation, use the following statement:

SQL.insert("" +
    "INSERT INTO ROLE_PERMISSION (ROLE_NR, PERMISSION_NAME) " +
    "VALUES (:role, :{permission})"
    , formData);

Switch to the PermissionTablePage and add a menu called AssignToRoleMenu. Have it start the AssignToRoleForm and call the NewHandler. Mark the menu as both a Single Selection Action and a Multi Selection Action. Change the execAction as follows:

@Override
protected void execAction() throws ProcessingException {
  AssignToRoleForm form = new AssignToRoleForm();
  form.setPermission(getTable().getPermissionColumn().getSelectedValues());
  form.startNew();
  form.waitFor();
  if (form.isFormStored()) {
    reloadPage();
  }
}

Ideally, this is what it will look like:

Minicrm Assign To Role.png

Select all the permissions and assign them to the Standard role.

Here's what you should get:

Minicrm Role With Permissions.png

Removing Permissions

Create a new permission called RemoveAssignToRolePermission (in the shared section) with super class BasicPermission.

Create a new operation void remove (Long roleNr, String[] permission) for AssignToRoleProcessService.

@Override
public void remove(Long roleNr, String[] permission) throws ProcessingException {
  if (!ACCESS.check(new RemoveAssignToRolePermission())) {
    throw new VetoException(TEXTS.get("AuthorizationFailed"));
  }
 
  SQL.insert("" +
      "DELETE FROM ROLE_PERMISSION " +
      "WHERE ROLE_NR = :role " +
      "AND PERMISSION_NAME = :{permission} "
      , new NVPair("roleNr", roleNr)
      , new NVPair("permission", permission));
 
}

Create a new RemovePermissionFromRoleMenu for the PermissionTablePage.

@Override
@ConfigOperation
@Order(30.0)
protected void execAction() throws ProcessingException {
  SERVICES.getService(IAssignToRoleProcessService.class).remove(getRoleNr(), getTable().getPermissionColumn().getSelectedValues());
  reloadPage();
}

Make it visible only when permissions below a role are shown using execPrepareAction:

@Override
protected void execPrepareAction() throws ProcessingException {
  if (getRoleNr() == null) setVisible(false);
}

Missing Pieces

Things you can add to practice:

  1. a form to create, modify and remove roles
  2. make sure menus that will result in "permission denied" errors are invisible
  3. make table pages invisible that display information you are not allowed to read

Authentication

Before you continue: make sure the administrator has the username "admin" and the administrator role. Make sure the administrator role has been assigned all permissions. Once we're done here you can lock yourself out of the application. If that happens, you will have to fix the permissions on the database.

Identifying Users

To get an idea of what goes on, find the ServerSession and change execLoadSession as follows:

@Override
protected void execLoadSession() throws ProcessingException{
  logger.warn("created a new session for "+getUserId());
}

When you start a new client, you'll see:

!MESSAGE eclipse.org.minicrm.server.ServerSession.execLoadSession(ServerSession.java:46) created a new session for anonymous

What user id? This is handled by security filters. Go to the config file of your server product (/eclipse.org.minicrm.server/products/development/config.ini). You'll see that the AnonymousSecurityFilter is active. IT provides the user id "anonymous".

Change the config.ini as follows:

### Servlet Filter Runtime Configuration
org.eclipse.scout.http.servletfilter.security.BasicSecurityFilter#active=true
org.eclipse.scout.http.servletfilter.security.BasicSecurityFilter#realm=minicrm Development
org.eclipse.scout.http.servletfilter.security.BasicSecurityFilter#users=admin\=manager,allen\=allen,blake\=blake

org.eclipse.scout.http.servletfilter.security.AnonymousSecurityFilter#active=false

Restart server and client.

You will be greeted with a login box! Provide one of the combinations from the config file. Username admin password manager for example.

The server log will show:

!MESSAGE eclipse.org.minicrm.server.ServerSession.execLoadSession(ServerSession.java:46) created a new session for admin

In order to deny access to unknown people, change execLoadSession as follows:

@Override
protected void execLoadSession() throws ProcessingException {
 
  SQL.selectInto("" +
      "SELECT PERSON_NR " +
      "FROM PERSON " +
      "WHERE UPPER(USERNAME) = UPPER(:userId) " +
      "INTO :personNr ");
 
  if (getPersonNr() == null) {
    logger.error("attempted login by " + getUserId());
    throw new ProcessingException("Unknown User: " + getUserId(), new SecurityException("access denied"));
  }
 
  logger.info("created a new session for " + getUserId());
}

Now you can attempt to login with a valid username/password combination and the system will check whether a person actually uses the usernames provided. By default, the three users in the demo database match the usernames in the config file. You need to add more combinations to the config file in order to test it.

(You'll note that username/password combinations are stored in the config file. We'll take a look at using LDAP further down.)

Granting Permissions to Users

Find the AccessControlService class and take a look at the execLoadPermissions method:

@Override
protected Permissions execLoadPermissions() {
  Permissions permissions = new Permissions();
  permissions.add(new RemoteServiceAccessPermission("*.shared.*", "*"));
  //TODO fill access control service
  permissions.add(new AllPermission());
  return permissions;
}

This grants every user all permissions. We need to replace this with something based on database. The following example even has a backdoor for the user with id 1!

@Override
protected Permissions execLoadPermissions() {
  Permissions permissions = new Permissions();
 
  // calling services is free
  permissions.add(new RemoteServiceAccessPermission("*.shared.*", "*"));
 
  // backdoor: the first user may do everything?
  if (ServerSession.get().getPersonNr().equals(1L)) {
    logger.warn("backdoor used: person nr 1 was granted all permissions");
    permissions.add(new AllPermission());
  }
  else {
    try {
 
      // get simple class names from the databse
      StringArrayHolder permission = new StringArrayHolder();
      SQL.selectInto("" +
	  "SELECT DISTINCT P.PERMISSION_NAME " +
	  "FROM ROLE_PERMISSION P, USER_ROLE R " +
	  "WHERE R.USER_NR = :personNr " +
	  "AND R.ROLE_NR = P.ROLE_NR " +
	  "INTO :permission ",
	  new NVPair("permission", permission));
 
      // create a map from simple class names to qualified class names
      HashMap<String, String> map = new HashMap<String, String>();
      for (BundleClassDescriptor descriptor : SERVICES.getService(IPermissionService.class).getAllPermissionClasses()) {
	map.put(descriptor.getSimpleClassName(), descriptor.getClassName());
      }
 
      // instantiate the real permissions and assign them
      for (String simpleClass : permission.getValue()) {
	try {
	  permissions.add((Permission) Class.forName(map.get(simpleClass)).newInstance());
	}
	catch (Exception e) {
	  logger.error("cannot find permission " + simpleClass + ": " + e.getMessage());
	}
      }
    }
    catch (ProcessingException e) {
      logger.error("cannot read permissions: " + e.getStackTrace());
    }
  }
 
  return permissions;
}

If you log in, you'll notice a strange warning on the server console:

... cannot find permission CreateVisitPermission: null
... cannot find permission ReadVisitPermission: null
... cannot find permission UpdateVisitPermission: null

If you investigate the demo database, you'll note data junk in ROLE_PERMISSION and USER_ROLE for the non-existent roles 5 to 13.

If you really want to clean it up:

DELETE FROM minicrm.role_permission WHERE role_nr > 2;
DELETE FROM minicrm.user_role WHERE role_nr > 2;

Caching

As permissions are granted when the server is started, you need to restart your client and server in order for any changes to take effect.

In order to change that, you need to clear the cache whenever you make any changes. Add the following statement to all the operations of the AssignToRoleProcessService:

SERVICES.getService(IAccessControlService.class).clearCache();

Add the following to the store operation of the PersonProcessService (there is no need to do it for create since there is no cached data to clear).

SERVICES.getService(IAccessControlService.class).clearCacheOfUserIds(formData.getUsername().getValue());

This will obviate the need to restart the server whenever permissions have changed.

Testing

  1. make sure the administrator has the administrator role
  2. make sure the administrator role has all permissions
  3. make sure the administrator has the username "admin"
  4. make sure the employee has the standard role
  5. make sure the standard role only has the two "read" permissions
  6. make sure the employee has the username "blake"
  7. restart client and server
  8. login as blake/blake
  9. you should be unable to create new companies and persons or and unable to edit existing ones

Minicrm Company Not Editable.png

Back to the top