Mercurial > hg > AnnotationManagerN4J
annotate src/main/java/de/mpiwg/itgroup/annotations/restlet/AnnotatorResourceImpl.java @ 48:0e00bf8e27fb
targets and resources of Annotation object are objects now.
author | casties |
---|---|
date | Wed, 26 Sep 2012 18:10:47 +0200 |
parents | 03e0f7574224 |
children | a52c597075dc |
rev | line source |
---|---|
3 | 1 /** |
2 * Base class for Annotator resource classes. | |
3 */ | |
4 package de.mpiwg.itgroup.annotations.restlet; | |
5 | |
6 import java.io.UnsupportedEncodingException; | |
7 import java.security.InvalidKeyException; | |
8 import java.security.SignatureException; | |
5 | 9 import java.text.SimpleDateFormat; |
3 | 10 import java.util.ArrayList; |
5 | 11 import java.util.Calendar; |
16 | 12 import java.util.HashSet; |
3 | 13 import java.util.List; |
16 | 14 import java.util.Set; |
3 | 15 import java.util.regex.Matcher; |
16 import java.util.regex.Pattern; | |
17 | |
18 import net.oauth.jsontoken.Checker; | |
19 import net.oauth.jsontoken.JsonToken; | |
20 import net.oauth.jsontoken.JsonTokenParser; | |
21 import net.oauth.jsontoken.SystemClock; | |
22 import net.oauth.jsontoken.crypto.HmacSHA256Verifier; | |
23 import net.oauth.jsontoken.crypto.Verifier; | |
24 | |
25 import org.apache.commons.codec.binary.Base64; | |
26 import org.apache.log4j.Logger; | |
27 import org.json.JSONArray; | |
28 import org.json.JSONException; | |
29 import org.json.JSONObject; | |
30 import org.restlet.data.Form; | |
31 import org.restlet.data.Status; | |
32 import org.restlet.representation.Representation; | |
33 import org.restlet.resource.Options; | |
34 import org.restlet.resource.ServerResource; | |
35 | |
9 | 36 import de.mpiwg.itgroup.annotations.Actor; |
4 | 37 import de.mpiwg.itgroup.annotations.Annotation; |
38 import de.mpiwg.itgroup.annotations.Annotation.FragmentTypes; | |
10 | 39 import de.mpiwg.itgroup.annotations.Group; |
19 | 40 import de.mpiwg.itgroup.annotations.NS; |
10 | 41 import de.mpiwg.itgroup.annotations.Person; |
48
0e00bf8e27fb
targets and resources of Annotation object are objects now.
casties
parents:
40
diff
changeset
|
42 import de.mpiwg.itgroup.annotations.Resource; |
0e00bf8e27fb
targets and resources of Annotation object are objects now.
casties
parents:
40
diff
changeset
|
43 import de.mpiwg.itgroup.annotations.Target; |
4 | 44 import de.mpiwg.itgroup.annotations.neo4j.AnnotationStore; |
3 | 45 |
46 /** | |
47 * Base class for Annotator resource classes. | |
48 * | |
49 * @author dwinter, casties | |
50 * | |
51 */ | |
52 public abstract class AnnotatorResourceImpl extends ServerResource { | |
53 | |
4 | 54 protected static Logger logger = Logger.getLogger(AnnotatorResourceImpl.class); |
55 | |
56 private AnnotationStore store; | |
3 | 57 |
58 protected String getAllowedMethodsForHeader() { | |
59 return "OPTIONS,GET,POST"; | |
60 } | |
61 | |
4 | 62 protected AnnotationStore getAnnotationStore() { |
63 if (store == null) { | |
19 | 64 store = ((BaseRestlet) getApplication()).getAnnotationStore(); |
4 | 65 } |
66 return store; | |
67 } | |
68 | |
3 | 69 public String encodeJsonId(String id) { |
22 | 70 if (id == null) return null; |
3 | 71 try { |
72 return Base64.encodeBase64URLSafeString(id.getBytes("UTF-8")); | |
73 } catch (UnsupportedEncodingException e) { | |
74 return null; | |
75 } | |
76 } | |
77 | |
78 public String decodeJsonId(String id) { | |
22 | 79 if (id == null) return null; |
3 | 80 try { |
81 return new String(Base64.decodeBase64(id), "UTF-8"); | |
82 } catch (UnsupportedEncodingException e) { | |
83 return null; | |
84 } | |
85 } | |
86 | |
87 /** | |
88 * Handle options request to allow CORS for AJAX. | |
89 * | |
90 * @param entity | |
91 */ | |
92 @Options | |
93 public void doOptions(Representation entity) { | |
94 logger.debug("AnnotatorResourceImpl doOptions!"); | |
95 setCorsHeaders(); | |
96 } | |
97 | |
98 /** | |
99 * set headers to allow CORS for AJAX. | |
100 */ | |
101 protected void setCorsHeaders() { | |
102 Form responseHeaders = (Form) getResponse().getAttributes().get("org.restlet.http.headers"); | |
103 if (responseHeaders == null) { | |
104 responseHeaders = new Form(); | |
105 getResponse().getAttributes().put("org.restlet.http.headers", responseHeaders); | |
106 } | |
107 responseHeaders.add("Access-Control-Allow-Methods", getAllowedMethodsForHeader()); | |
108 // echo back Origin and Request-Headers | |
109 Form requestHeaders = (Form) getRequest().getAttributes().get("org.restlet.http.headers"); | |
110 String origin = requestHeaders.getFirstValue("Origin", true); | |
111 if (origin == null) { | |
112 responseHeaders.add("Access-Control-Allow-Origin", "*"); | |
113 } else { | |
114 responseHeaders.add("Access-Control-Allow-Origin", origin); | |
115 } | |
116 String allowHeaders = requestHeaders.getFirstValue("Access-Control-Request-Headers", true); | |
117 if (allowHeaders != null) { | |
118 responseHeaders.add("Access-Control-Allow-Headers", allowHeaders); | |
119 } | |
120 responseHeaders.add("Access-Control-Allow-Credentials", "true"); | |
121 responseHeaders.add("Access-Control-Max-Age", "60"); | |
122 } | |
123 | |
124 /** | |
125 * returns if authentication information from headers is valid. | |
126 * | |
127 * @param entity | |
128 * @return | |
129 */ | |
130 public boolean isAuthenticated(Representation entity) { | |
131 return (checkAuthToken(entity) != null); | |
132 } | |
133 | |
134 /** | |
4 | 135 * checks Annotator Auth plugin authentication information from headers. |
136 * returns userId if successful. | |
3 | 137 * |
138 * @param entity | |
139 * @return | |
140 */ | |
141 public String checkAuthToken(Representation entity) { | |
142 Form requestHeaders = (Form) getRequest().getAttributes().get("org.restlet.http.headers"); | |
143 String authToken = requestHeaders.getFirstValue("x-annotator-auth-token", true); | |
14
629e15b345aa
permissions mostly work. need more server-side checking.
casties
parents:
10
diff
changeset
|
144 if (authToken == null) return null; |
3 | 145 // decode token first to get consumer key |
146 JsonToken token = new JsonTokenParser(null, null).deserialize(authToken); | |
147 String userId = token.getParamAsPrimitive("userId").getAsString(); | |
148 String consumerKey = token.getParamAsPrimitive("consumerKey").getAsString(); | |
149 // get stored consumer secret for key | |
18 | 150 BaseRestlet restServer = (BaseRestlet) getApplication(); |
3 | 151 String consumerSecret = restServer.getConsumerSecret(consumerKey); |
152 logger.debug("requested consumer key=" + consumerKey + " secret=" + consumerSecret); | |
153 if (consumerSecret == null) { | |
154 return null; | |
155 } | |
156 // logger.debug(String.format("token=%s tokenString=%s signatureAlgorithm=%s",token,token.getTokenString(),token.getSignatureAlgorithm())); | |
157 try { | |
158 List<Verifier> verifiers = new ArrayList<Verifier>(); | |
159 // we only do HS256 yet | |
160 verifiers.add(new HmacSHA256Verifier(consumerSecret.getBytes("UTF-8"))); | |
161 // verify token signature(should really be static...) | |
162 new JsonTokenParser(new SystemClock(), null, (Checker[]) null).verify(token, verifiers); | |
163 } catch (SignatureException e) { | |
164 // TODO Auto-generated catch block | |
165 e.printStackTrace(); | |
166 } catch (InvalidKeyException e) { | |
167 // TODO Auto-generated catch block | |
168 e.printStackTrace(); | |
169 } catch (UnsupportedEncodingException e) { | |
170 // TODO Auto-generated catch block | |
171 e.printStackTrace(); | |
172 } | |
173 // must be ok then | |
174 logger.debug("auth OK! user=" + userId); | |
175 return userId; | |
176 } | |
177 | |
178 /** | |
179 * creates Annotator-JSON from an Annotation object. | |
180 * | |
181 * @param annot | |
14
629e15b345aa
permissions mostly work. need more server-side checking.
casties
parents:
10
diff
changeset
|
182 * @param forAnonymous TODO |
3 | 183 * @return |
184 */ | |
14
629e15b345aa
permissions mostly work. need more server-side checking.
casties
parents:
10
diff
changeset
|
185 public JSONObject createAnnotatorJson(Annotation annot, boolean forAnonymous) { |
5 | 186 // return user as a JSON object (otherwise just as string) |
3 | 187 boolean makeUserObject = true; |
188 JSONObject jo = new JSONObject(); | |
189 try { | |
4 | 190 jo.put("text", annot.getBodyText()); |
191 jo.put("uri", annot.getTargetBaseUri()); | |
40
03e0f7574224
saving and loading resource targets should work now (no searching yet)
casties
parents:
22
diff
changeset
|
192 if (annot.getResourceUri() != null) { |
03e0f7574224
saving and loading resource targets should work now (no searching yet)
casties
parents:
22
diff
changeset
|
193 jo.put("resource", annot.getResourceUri()); |
03e0f7574224
saving and loading resource targets should work now (no searching yet)
casties
parents:
22
diff
changeset
|
194 } |
3 | 195 |
16 | 196 /* |
197 * user | |
198 */ | |
3 | 199 if (makeUserObject) { |
200 // create user object | |
201 JSONObject userObject = new JSONObject(); | |
10 | 202 Actor creator = annot.getCreator(); |
3 | 203 // save creator as uri |
10 | 204 userObject.put("uri", creator.getUri()); |
3 | 205 // make short user id |
10 | 206 String userId = creator.getIdString(); |
9 | 207 // set as id |
4 | 208 userObject.put("id", userId); |
3 | 209 // get full name |
10 | 210 String userName = creator.getName(); |
5 | 211 if (userName == null) { |
18 | 212 BaseRestlet restServer = (BaseRestlet) getApplication(); |
5 | 213 userName = restServer.getFullNameFromLdap(userId); |
214 } | |
3 | 215 userObject.put("name", userName); |
216 // save user object | |
217 jo.put("user", userObject); | |
218 } else { | |
219 // save user as string | |
4 | 220 jo.put("user", annot.getCreatorUri()); |
3 | 221 } |
222 | |
16 | 223 /* |
224 * ranges | |
225 */ | |
4 | 226 if (annot.getTargetFragment() != null) { |
3 | 227 // we only look at the first xpointer |
4 | 228 List<String> fragments = new ArrayList<String>(); |
229 fragments.add(annot.getTargetFragment()); | |
230 FragmentTypes xt = annot.getFragmentType(); | |
231 if (xt == FragmentTypes.XPOINTER) { | |
232 jo.put("ranges", transformToRanges(fragments)); | |
233 } else if (xt == FragmentTypes.AREA) { | |
234 jo.put("areas", transformToAreas(fragments)); | |
3 | 235 } |
236 } | |
10 | 237 |
16 | 238 /* |
239 * permissions | |
240 */ | |
10 | 241 JSONObject perms = new JSONObject(); |
242 jo.put("permissions", perms); | |
243 // admin | |
244 JSONArray adminPerms = new JSONArray(); | |
245 perms.put("admin", adminPerms); | |
246 Actor adminPerm = annot.getAdminPermission(); | |
247 if (adminPerm != null) { | |
248 adminPerms.put(adminPerm.getIdString()); | |
14
629e15b345aa
permissions mostly work. need more server-side checking.
casties
parents:
10
diff
changeset
|
249 } else if (forAnonymous) { |
629e15b345aa
permissions mostly work. need more server-side checking.
casties
parents:
10
diff
changeset
|
250 // set something because its not allowed for anonymous |
629e15b345aa
permissions mostly work. need more server-side checking.
casties
parents:
10
diff
changeset
|
251 adminPerms.put("not-you"); |
10 | 252 } |
253 // delete | |
254 JSONArray deletePerms = new JSONArray(); | |
255 perms.put("delete", deletePerms); | |
256 Actor deletePerm = annot.getDeletePermission(); | |
257 if (deletePerm != null) { | |
258 deletePerms.put(deletePerm.getIdString()); | |
14
629e15b345aa
permissions mostly work. need more server-side checking.
casties
parents:
10
diff
changeset
|
259 } else if (forAnonymous) { |
629e15b345aa
permissions mostly work. need more server-side checking.
casties
parents:
10
diff
changeset
|
260 // set something because its not allowed for anonymous |
629e15b345aa
permissions mostly work. need more server-side checking.
casties
parents:
10
diff
changeset
|
261 deletePerms.put("not-you"); |
10 | 262 } |
263 // update | |
264 JSONArray updatePerms = new JSONArray(); | |
265 perms.put("update", updatePerms); | |
266 Actor updatePerm = annot.getUpdatePermission(); | |
267 if (updatePerm != null) { | |
268 updatePerms.put(updatePerm.getIdString()); | |
14
629e15b345aa
permissions mostly work. need more server-side checking.
casties
parents:
10
diff
changeset
|
269 } else if (forAnonymous) { |
629e15b345aa
permissions mostly work. need more server-side checking.
casties
parents:
10
diff
changeset
|
270 // set something because its not allowed for anonymous |
629e15b345aa
permissions mostly work. need more server-side checking.
casties
parents:
10
diff
changeset
|
271 updatePerms.put("not-you"); |
10 | 272 } |
273 // read | |
274 JSONArray readPerms = new JSONArray(); | |
275 perms.put("read", readPerms); | |
276 Actor readPerm = annot.getReadPermission(); | |
277 if (readPerm != null) { | |
278 readPerms.put(readPerm.getIdString()); | |
279 } | |
280 | |
16 | 281 /* |
282 * tags | |
283 */ | |
284 Set<String> tagset = annot.getTags(); | |
285 if (tagset != null) { | |
286 JSONArray tags = new JSONArray(); | |
287 jo.put("tags", tags); | |
288 for (String tag : tagset) { | |
289 tags.put(tag); | |
290 } | |
291 } | |
292 | |
293 /* | |
294 * id | |
295 */ | |
3 | 296 // encode Annotation URL (=id) in base64 |
4 | 297 String annotUrl = annot.getUri(); |
3 | 298 String annotId = encodeJsonId(annotUrl); |
299 jo.put("id", annotId); | |
300 return jo; | |
301 } catch (JSONException e) { | |
302 // TODO Auto-generated catch block | |
303 e.printStackTrace(); | |
304 } | |
305 return null; | |
306 } | |
307 | |
308 private JSONArray transformToRanges(List<String> xpointers) { | |
309 | |
310 JSONArray ja = new JSONArray(); | |
311 | |
312 Pattern rg = Pattern | |
4 | 313 .compile("xpointer\\(start-point\\(string-range\\(\"([^\"]*)\",([^,]*),1\\)\\)/range-to\\(end-point\\(string-range\\(\"([^\"]*)\",([^,]*),1\\)\\)\\)\\)"); |
314 Pattern rg1 = Pattern.compile("xpointer\\(start-point\\(string-range\\(\"([^\"]*)\",([^,]*),1\\)\\)\\)"); | |
3 | 315 |
316 try { | |
317 for (String xpointer : xpointers) { | |
10 | 318 // String decoded = URLDecoder.decode(xpointer, "utf-8"); |
5 | 319 String decoded = xpointer; |
3 | 320 Matcher m = rg.matcher(decoded); |
321 | |
322 if (m.find()) { | |
323 { | |
324 JSONObject jo = new JSONObject(); | |
325 jo.put("start", m.group(1)); | |
326 jo.put("startOffset", m.group(2)); | |
327 jo.put("end", m.group(3)); | |
328 jo.put("endOffset", m.group(4)); | |
329 ja.put(jo); | |
330 } | |
331 } | |
332 m = rg1.matcher(xpointer); | |
333 if (m.find()) { | |
334 JSONObject jo = new JSONObject(); | |
335 jo.put("start", m.group(1)); | |
336 jo.put("startOffset", m.group(2)); | |
337 | |
338 ja.put(jo); | |
339 } | |
340 } | |
341 } catch (JSONException e) { | |
342 // TODO Auto-generated catch block | |
343 e.printStackTrace(); | |
344 } | |
345 return ja; | |
346 } | |
347 | |
348 private JSONArray transformToAreas(List<String> xpointers) { | |
349 | |
350 JSONArray ja = new JSONArray(); | |
351 | |
4 | 352 Pattern rg = Pattern.compile("xywh=(\\w*:)([\\d\\.]+),([\\d\\.]+),([\\d\\.]+),([\\d\\.]+)"); |
3 | 353 |
354 try { | |
355 for (String xpointer : xpointers) { | |
10 | 356 // String decoded = URLDecoder.decode(xpointer, "utf-8"); |
5 | 357 String decoded = xpointer; |
3 | 358 Matcher m = rg.matcher(decoded); |
359 | |
360 if (m.find()) { | |
361 { | |
362 JSONObject jo = new JSONObject(); | |
10 | 363 @SuppressWarnings("unused") |
3 | 364 String unit = m.group(1); |
365 jo.put("x", m.group(2)); | |
366 jo.put("y", m.group(3)); | |
367 jo.put("width", m.group(4)); | |
368 jo.put("height", m.group(5)); | |
369 ja.put(jo); | |
370 } | |
371 } | |
372 } | |
373 } catch (JSONException e) { | |
374 // TODO Auto-generated catch block | |
375 e.printStackTrace(); | |
376 } | |
377 return ja; | |
378 } | |
379 | |
5 | 380 protected String parseArea(JSONObject area) throws JSONException { |
4 | 381 String x = area.getString("x"); |
382 String y = area.getString("y"); | |
383 String width = "0"; | |
384 String height = "0"; | |
385 if (area.has("width")) { | |
386 width = area.getString("width"); | |
387 height = area.getString("height"); | |
388 } | |
5 | 389 String fragment = String.format("xywh=fraction:%s,%s,%s,%s", x, y, width, height); |
4 | 390 return fragment; |
391 } | |
392 | |
5 | 393 protected String parseRange(JSONObject range) throws JSONException { |
4 | 394 String start = range.getString("start"); |
395 String end = range.getString("end"); | |
396 String startOffset = range.getString("startOffset"); | |
397 String endOffset = range.getString("endOffset"); | |
398 | |
5 | 399 String fragment = String.format( |
4 | 400 "xpointer(start-point(string-range(\"%s\",%s,1))/range-to(end-point(string-range(\"%s\",%s,1))))", start, |
5 | 401 startOffset, end, endOffset); |
4 | 402 return fragment; |
403 } | |
404 | |
3 | 405 /** |
5 | 406 * Creates an Annotation object with data from JSON. |
3 | 407 * |
4 | 408 * uses the specification from the annotator project: {@link https |
409 * ://github.com/okfn/annotator/wiki/Annotation-format} | |
3 | 410 * |
4 | 411 * The username will be transformed to an URI if not given already as URI, |
412 * if not it will set to the MPIWG namespace defined in | |
3 | 413 * de.mpiwg.itgroup.annotationManager.Constants.NS |
414 * | |
415 * @param jo | |
416 * @return | |
417 * @throws JSONException | |
4 | 418 * @throws UnsupportedEncodingException |
3 | 419 */ |
4 | 420 public Annotation createAnnotation(JSONObject jo, Representation entity) throws JSONException, UnsupportedEncodingException { |
3 | 421 return updateAnnotation(new Annotation(), jo, entity); |
422 } | |
423 | |
5 | 424 /** |
425 * Updates an Annotation object with data from JSON. | |
426 * | |
427 * uses the specification from the annotator project: {@link https | |
428 * ://github.com/okfn/annotator/wiki/Annotation-format} | |
429 * | |
430 * The username will be transformed to an URI if not given already as URI, | |
431 * if not it will set to the MPIWG namespace defined in | |
432 * de.mpiwg.itgroup.annotationManager.Constants.NS | |
433 * | |
434 * @param annot | |
435 * @param jo | |
436 * @return | |
437 * @throws JSONException | |
438 * @throws UnsupportedEncodingException | |
439 */ | |
4 | 440 public Annotation updateAnnotation(Annotation annot, JSONObject jo, Representation entity) throws JSONException, |
441 UnsupportedEncodingException { | |
16 | 442 /* |
443 * target uri | |
444 */ | |
3 | 445 if (jo.has("uri")) { |
48
0e00bf8e27fb
targets and resources of Annotation object are objects now.
casties
parents:
40
diff
changeset
|
446 annot.setTarget(new Target(jo.getString("uri"))); |
3 | 447 } |
16 | 448 /* |
40
03e0f7574224
saving and loading resource targets should work now (no searching yet)
casties
parents:
22
diff
changeset
|
449 * resource uri |
03e0f7574224
saving and loading resource targets should work now (no searching yet)
casties
parents:
22
diff
changeset
|
450 */ |
03e0f7574224
saving and loading resource targets should work now (no searching yet)
casties
parents:
22
diff
changeset
|
451 if (jo.has("resource")) { |
48
0e00bf8e27fb
targets and resources of Annotation object are objects now.
casties
parents:
40
diff
changeset
|
452 annot.setResource(new Resource(jo.getString("resource"))); |
40
03e0f7574224
saving and loading resource targets should work now (no searching yet)
casties
parents:
22
diff
changeset
|
453 } |
03e0f7574224
saving and loading resource targets should work now (no searching yet)
casties
parents:
22
diff
changeset
|
454 /* |
16 | 455 * annotation text |
456 */ | |
3 | 457 if (jo.has("text")) { |
4 | 458 annot.setBodyText(jo.getString("text")); |
3 | 459 } |
16 | 460 /* |
461 * check authentication | |
462 */ | |
3 | 463 String authUser = checkAuthToken(entity); |
464 if (authUser == null) { | |
4 | 465 /* |
466 * // try http auth User httpUser = getHttpAuthUser(entity); if | |
467 * (httpUser == null) { | |
468 */ | |
469 setStatus(Status.CLIENT_ERROR_FORBIDDEN); | |
470 return null; | |
471 /* | |
472 * } authUser = httpUser.getIdentifier(); | |
473 */ | |
3 | 474 } |
16 | 475 /* |
476 * get or create creator object | |
477 */ | |
9 | 478 Actor creator = annot.getCreator(); |
479 if (creator == null) { | |
10 | 480 creator = new Person(); |
9 | 481 annot.setCreator(creator); |
482 } | |
3 | 483 // username not required, if no username given authuser will be used |
484 String username = null; | |
10 | 485 String userUri = creator.getUri(); |
3 | 486 if (jo.has("user")) { |
487 if (jo.get("user") instanceof String) { | |
488 // user is just a String | |
489 username = jo.getString("user"); | |
10 | 490 creator.setId(username); |
3 | 491 // TODO: what if username and authUser are different? |
492 } else { | |
493 // user is an object | |
494 JSONObject user = jo.getJSONObject("user"); | |
495 if (user.has("id")) { | |
10 | 496 String id = user.getString("id"); |
497 creator.setId(id); | |
498 username = id; | |
3 | 499 } |
500 if (user.has("uri")) { | |
501 userUri = user.getString("uri"); | |
502 } | |
503 } | |
504 } | |
505 if (username == null) { | |
506 username = authUser; | |
507 } | |
5 | 508 // try to get full name |
9 | 509 if (creator.getName() == null && username != null) { |
18 | 510 BaseRestlet restServer = (BaseRestlet) getApplication(); |
5 | 511 String fullName = restServer.getFullNameFromLdap(username); |
9 | 512 creator.setName(fullName); |
5 | 513 } |
514 // userUri should be a URI, if not it will set to the MPIWG namespace | |
3 | 515 if (userUri == null) { |
516 if (username.startsWith("http")) { | |
517 userUri = username; | |
518 } else { | |
519 userUri = NS.MPIWG_PERSONS_URL + username; | |
520 } | |
521 } | |
522 // TODO: should we overwrite the creator? | |
9 | 523 if (creator.getUri() == null) { |
524 creator.setUri(userUri); | |
5 | 525 } |
16 | 526 /* |
527 * creation date | |
528 */ | |
5 | 529 if (annot.getCreated() == null) { |
530 // set creation date | |
531 SimpleDateFormat format = new SimpleDateFormat("yyyy-MM-dd'T'HH:mm:ss'Z'"); | |
532 String ct = format.format(Calendar.getInstance().getTime()); | |
533 annot.setCreated(ct); | |
534 } | |
3 | 535 |
16 | 536 /* |
537 * create xpointer from the first range/area | |
538 */ | |
3 | 539 if (jo.has("ranges")) { |
540 JSONObject ranges = jo.getJSONArray("ranges").getJSONObject(0); | |
4 | 541 annot.setFragmentType(FragmentTypes.XPOINTER); |
542 String fragment = parseRange(ranges); | |
543 annot.setTargetFragment(fragment); | |
3 | 544 } |
545 if (jo.has("areas")) { | |
546 JSONObject area = jo.getJSONArray("areas").getJSONObject(0); | |
4 | 547 annot.setFragmentType(FragmentTypes.AREA); |
548 String fragment = parseArea(area); | |
549 annot.setTargetFragment(fragment); | |
3 | 550 } |
10 | 551 |
16 | 552 /* |
553 * permissions | |
554 */ | |
10 | 555 if (jo.has("permissions")) { |
556 JSONObject permissions = jo.getJSONObject("permissions"); | |
557 if (permissions.has("admin")) { | |
558 JSONArray perms = permissions.getJSONArray("admin"); | |
559 Actor actor = getActorFromPermissions(perms); | |
560 annot.setAdminPermission(actor); | |
561 } | |
562 if (permissions.has("delete")) { | |
563 JSONArray perms = permissions.getJSONArray("delete"); | |
564 Actor actor = getActorFromPermissions(perms); | |
565 annot.setDeletePermission(actor); | |
566 } | |
567 if (permissions.has("update")) { | |
568 JSONArray perms = permissions.getJSONArray("update"); | |
569 Actor actor = getActorFromPermissions(perms); | |
570 annot.setUpdatePermission(actor); | |
571 } | |
572 if (permissions.has("read")) { | |
573 JSONArray perms = permissions.getJSONArray("read"); | |
574 Actor actor = getActorFromPermissions(perms); | |
575 annot.setReadPermission(actor); | |
576 } | |
577 } | |
578 | |
16 | 579 /* |
580 * tags | |
581 */ | |
582 if (jo.has("tags")) { | |
583 HashSet<String> tagset = new HashSet<String>(); | |
584 JSONArray tags = jo.getJSONArray("tags"); | |
585 for (int i = 0; i < tags.length(); ++i) { | |
586 tagset.add(tags.getString(i)); | |
587 } | |
588 annot.setTags(tagset); | |
589 } | |
590 | |
591 | |
4 | 592 return annot; |
3 | 593 } |
594 | |
15 | 595 @SuppressWarnings("unused") // i in for loop |
10 | 596 protected Actor getActorFromPermissions(JSONArray perms) throws JSONException { |
597 Actor actor = null; | |
598 for (int i = 0; i < perms.length(); ++i) { | |
599 String perm = perms.getString(i); | |
600 if (perm.toLowerCase().startsWith("group:")) { | |
601 String groupId = perm.substring(6); | |
602 actor = new Group(groupId); | |
603 } else { | |
604 actor = new Person(perm); | |
605 } | |
606 // we just take the first one | |
607 break; | |
608 } | |
609 return actor; | |
610 } | |
611 | |
3 | 612 } |