|
|
|
@ -24,10 +24,7 @@ import org.wso2.carbon.context.CarbonContext;
|
|
|
|
|
import org.wso2.carbon.device.mgt.common.*;
|
|
|
|
|
import org.wso2.carbon.device.mgt.common.authorization.DeviceAccessAuthorizationException;
|
|
|
|
|
import org.wso2.carbon.device.mgt.common.group.mgt.DeviceGroupConstants;
|
|
|
|
|
import org.wso2.carbon.device.mgt.common.operation.mgt.Activity;
|
|
|
|
|
import org.wso2.carbon.device.mgt.common.operation.mgt.Operation;
|
|
|
|
|
import org.wso2.carbon.device.mgt.common.operation.mgt.OperationManagementException;
|
|
|
|
|
import org.wso2.carbon.device.mgt.common.operation.mgt.OperationManager;
|
|
|
|
|
import org.wso2.carbon.device.mgt.common.operation.mgt.*;
|
|
|
|
|
import org.wso2.carbon.device.mgt.common.push.notification.NotificationContext;
|
|
|
|
|
import org.wso2.carbon.device.mgt.common.push.notification.NotificationStrategy;
|
|
|
|
|
import org.wso2.carbon.device.mgt.common.push.notification.PushNotificationExecutionFailedException;
|
|
|
|
@ -90,7 +87,8 @@ public class OperationManagerImpl implements OperationManager {
|
|
|
|
|
|
|
|
|
|
@Override
|
|
|
|
|
public Activity addOperation(Operation operation,
|
|
|
|
|
List<DeviceIdentifier> deviceIds) throws OperationManagementException, InvalidDeviceException {
|
|
|
|
|
List<DeviceIdentifier> deviceIds)
|
|
|
|
|
throws OperationManagementException, InvalidDeviceException {
|
|
|
|
|
if (log.isDebugEnabled()) {
|
|
|
|
|
log.debug("operation:[" + operation.toString() + "]");
|
|
|
|
|
for (DeviceIdentifier deviceIdentifier : deviceIds) {
|
|
|
|
@ -99,13 +97,19 @@ public class OperationManagerImpl implements OperationManager {
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
try {
|
|
|
|
|
DeviceIDHolder deviceIDHolder = DeviceManagerUtil.validateDeviceIdentifiers(deviceIds);
|
|
|
|
|
List<DeviceIdentifier> validDeviceIds = deviceIDHolder.getValidDeviceIDList();
|
|
|
|
|
DeviceIDHolder deviceValidationResult = DeviceManagerUtil.validateDeviceIdentifiers(deviceIds);
|
|
|
|
|
List<DeviceIdentifier> validDeviceIds = deviceValidationResult.getValidDeviceIDList();
|
|
|
|
|
if (validDeviceIds.size() > 0) {
|
|
|
|
|
List<DeviceIdentifier> authorizedDeviceList = this.getAuthorizedDevices(operation, validDeviceIds);
|
|
|
|
|
DeviceIDHolder deviceAuthorizationResult = this.authorizeDevices(operation, validDeviceIds);
|
|
|
|
|
List<DeviceIdentifier> authorizedDeviceList = deviceAuthorizationResult.getValidDeviceIDList();
|
|
|
|
|
if (authorizedDeviceList.size() <= 0) {
|
|
|
|
|
log.info("User : " + getUser() + " is not authorized to perform operations on given device-list.");
|
|
|
|
|
return null;
|
|
|
|
|
Activity activity = new Activity();
|
|
|
|
|
//Send the operation statuses only for admin triggered operations
|
|
|
|
|
String deviceType = validDeviceIds.get(0).getType();
|
|
|
|
|
activity.setActivityStatus(this.getActivityStatus(deviceValidationResult, deviceAuthorizationResult,
|
|
|
|
|
deviceType));
|
|
|
|
|
return activity;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
OperationManagementDAOFactory.beginTransaction();
|
|
|
|
@ -157,6 +161,12 @@ public class OperationManagerImpl implements OperationManager {
|
|
|
|
|
activity.setCode(operationCode);
|
|
|
|
|
activity.setCreatedTimeStamp(new Date().toString());
|
|
|
|
|
activity.setType(Activity.Type.valueOf(operationDto.getType().toString()));
|
|
|
|
|
//For now set the operation statuses only for admin triggered operations
|
|
|
|
|
if (!isScheduledOperation) {
|
|
|
|
|
//Get the device-type from 1st valid DeviceIdentifier. We know the 1st element is definitely there.
|
|
|
|
|
String deviceType = validDeviceIds.get(0).getType();
|
|
|
|
|
activity.setActivityStatus(this.getActivityStatus(deviceValidationResult, deviceAuthorizationResult, deviceType));
|
|
|
|
|
}
|
|
|
|
|
return activity;
|
|
|
|
|
} else {
|
|
|
|
|
throw new InvalidDeviceException("Invalid device Identifiers found.");
|
|
|
|
@ -171,21 +181,64 @@ public class OperationManagerImpl implements OperationManager {
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
private List<DeviceIdentifier> getAuthorizedDevices(
|
|
|
|
|
private List<ActivityStatus> getActivityStatus(DeviceIDHolder deviceIdValidationResult, DeviceIDHolder deviceAuthResult,
|
|
|
|
|
String deviceType) {
|
|
|
|
|
List<ActivityStatus> activityStatuses = new ArrayList<>();
|
|
|
|
|
ActivityStatus activityStatus;
|
|
|
|
|
//Add the invalid DeviceIds
|
|
|
|
|
for (String id : deviceIdValidationResult.getErrorDeviceIdList()) {
|
|
|
|
|
activityStatus = new ActivityStatus();
|
|
|
|
|
activityStatus.setDeviceIdentifier(new DeviceIdentifier(id,deviceType));
|
|
|
|
|
activityStatus.setStatus(ActivityStatus.Status.INVALID);
|
|
|
|
|
activityStatuses.add(activityStatus);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//Add the unauthorized DeviceIds
|
|
|
|
|
for (String id : deviceAuthResult.getErrorDeviceIdList()) {
|
|
|
|
|
activityStatus = new ActivityStatus();
|
|
|
|
|
activityStatus.setDeviceIdentifier(new DeviceIdentifier(id, deviceType));
|
|
|
|
|
activityStatus.setStatus(ActivityStatus.Status.UNAUTHORIZED);
|
|
|
|
|
activityStatuses.add(activityStatus);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
//Add the authorized DeviceIds
|
|
|
|
|
for (DeviceIdentifier id : deviceAuthResult.getValidDeviceIDList()) {
|
|
|
|
|
activityStatus = new ActivityStatus();
|
|
|
|
|
activityStatus.setDeviceIdentifier(id);
|
|
|
|
|
activityStatus.setStatus(ActivityStatus.Status.PENDING);
|
|
|
|
|
activityStatuses.add(activityStatus);
|
|
|
|
|
}
|
|
|
|
|
return activityStatuses;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
private DeviceIDHolder authorizeDevices(
|
|
|
|
|
Operation operation, List<DeviceIdentifier> deviceIds) throws OperationManagementException {
|
|
|
|
|
List<DeviceIdentifier> authorizedDeviceList;
|
|
|
|
|
List<String> unAuthorizedDeviceList = new ArrayList<>();
|
|
|
|
|
DeviceIDHolder deviceIDHolder = new DeviceIDHolder();
|
|
|
|
|
try {
|
|
|
|
|
if (operation != null && isAuthenticationSkippedOperation(operation)) {
|
|
|
|
|
authorizedDeviceList = deviceIds;
|
|
|
|
|
} else {
|
|
|
|
|
authorizedDeviceList = DeviceManagementDataHolder.getInstance().
|
|
|
|
|
getDeviceAccessAuthorizationService().isUserAuthorized(deviceIds).getAuthorizedDevices();
|
|
|
|
|
boolean isAuthorized;
|
|
|
|
|
authorizedDeviceList = new ArrayList<>();
|
|
|
|
|
for (DeviceIdentifier devId : deviceIds) {
|
|
|
|
|
isAuthorized = DeviceManagementDataHolder.getInstance().getDeviceAccessAuthorizationService().
|
|
|
|
|
isUserAuthorized(devId);
|
|
|
|
|
if (isAuthorized) {
|
|
|
|
|
authorizedDeviceList.add(devId);
|
|
|
|
|
} else {
|
|
|
|
|
unAuthorizedDeviceList.add(devId.getId());
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
}
|
|
|
|
|
} catch (DeviceAccessAuthorizationException e) {
|
|
|
|
|
throw new OperationManagementException("Error occurred while authorizing access to the devices for user :" +
|
|
|
|
|
this.getUser(), e);
|
|
|
|
|
}
|
|
|
|
|
return authorizedDeviceList;
|
|
|
|
|
deviceIDHolder.setValidDeviceIDList(authorizedDeviceList);
|
|
|
|
|
deviceIDHolder.setErrorDeviceIdList(unAuthorizedDeviceList);
|
|
|
|
|
return deviceIDHolder;
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
private Device getDevice(DeviceIdentifier deviceId) throws OperationManagementException {
|
|
|
|
@ -211,7 +264,8 @@ public class OperationManagerImpl implements OperationManager {
|
|
|
|
|
|
|
|
|
|
if (!isActionAuthorized(deviceId)) {
|
|
|
|
|
throw new OperationManagementException("User '" + getUser() + "' is not authorized to access the '" +
|
|
|
|
|
deviceId.getType() + "' device, which carries the identifier '" + deviceId.getId() + "'");
|
|
|
|
|
deviceId.getType() + "' device, which carries the identifier '" +
|
|
|
|
|
deviceId.getId() + "'");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int enrolmentId = this.getEnrolmentByStatus(deviceId, EnrolmentInfo.Status.ACTIVE);
|
|
|
|
@ -250,7 +304,8 @@ public class OperationManagerImpl implements OperationManager {
|
|
|
|
|
|
|
|
|
|
if (!isActionAuthorized(deviceId)) {
|
|
|
|
|
throw new OperationManagementException("User '" + getUser() + "' is not authorized to access the '" +
|
|
|
|
|
deviceId.getType() + "' device, which carries the identifier '" + deviceId.getId() + "'");
|
|
|
|
|
deviceId.getType() + "' device, which carries the identifier '" +
|
|
|
|
|
deviceId.getId() + "'");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int enrolmentId = this.getEnrolmentByStatus(deviceId, EnrolmentInfo.Status.ACTIVE);
|
|
|
|
@ -298,7 +353,8 @@ public class OperationManagerImpl implements OperationManager {
|
|
|
|
|
|
|
|
|
|
if (!isActionAuthorized(deviceId)) {
|
|
|
|
|
throw new OperationManagementException("User '" + getUser() + "' is not authorized to access the '" +
|
|
|
|
|
deviceId.getType() + "' device, which carries the identifier '" + deviceId.getId() + "'");
|
|
|
|
|
deviceId.getType() + "' device, which carries the identifier '" +
|
|
|
|
|
deviceId.getId() + "'");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int enrolmentId = this.getEnrolmentByStatus(deviceId, EnrolmentInfo.Status.ACTIVE);
|
|
|
|
@ -346,7 +402,8 @@ public class OperationManagerImpl implements OperationManager {
|
|
|
|
|
|
|
|
|
|
if (!isActionAuthorized(deviceId)) {
|
|
|
|
|
throw new OperationManagementException("User '" + getUser() + "' is not authorized to access the '" +
|
|
|
|
|
deviceId.getType() + "' device, which carries the identifier '" + deviceId.getId() + "'");
|
|
|
|
|
deviceId.getType() + "' device, which carries the identifier '" +
|
|
|
|
|
deviceId.getId() + "'");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int enrolmentId = this.getEnrolmentByStatus(deviceId, EnrolmentInfo.Status.ACTIVE);
|
|
|
|
@ -359,23 +416,30 @@ public class OperationManagerImpl implements OperationManager {
|
|
|
|
|
try {
|
|
|
|
|
OperationManagementDAOFactory.openConnection();
|
|
|
|
|
org.wso2.carbon.device.mgt.core.dto.operation.mgt.Operation dtoOperation = operationDAO.
|
|
|
|
|
getNextOperation(enrolmentId);
|
|
|
|
|
getNextOperation(
|
|
|
|
|
enrolmentId);
|
|
|
|
|
if (dtoOperation != null) {
|
|
|
|
|
if (org.wso2.carbon.device.mgt.core.dto.operation.mgt.Operation.Type.COMMAND.
|
|
|
|
|
equals(dtoOperation.getType())) {
|
|
|
|
|
equals(dtoOperation
|
|
|
|
|
.getType())) {
|
|
|
|
|
org.wso2.carbon.device.mgt.core.dto.operation.mgt.CommandOperation commandOperation;
|
|
|
|
|
commandOperation =
|
|
|
|
|
(org.wso2.carbon.device.mgt.core.dto.operation.mgt.CommandOperation) commandOperationDAO.
|
|
|
|
|
getOperation(dtoOperation.getId());
|
|
|
|
|
getOperation(
|
|
|
|
|
dtoOperation
|
|
|
|
|
.getId());
|
|
|
|
|
dtoOperation.setEnabled(commandOperation.isEnabled());
|
|
|
|
|
} else if (org.wso2.carbon.device.mgt.core.dto.operation.mgt.Operation.Type.CONFIG.
|
|
|
|
|
equals(dtoOperation.getType())) {
|
|
|
|
|
equals(dtoOperation
|
|
|
|
|
.getType())) {
|
|
|
|
|
dtoOperation = configOperationDAO.getOperation(dtoOperation.getId());
|
|
|
|
|
} else if (org.wso2.carbon.device.mgt.core.dto.operation.mgt.Operation.Type.PROFILE.
|
|
|
|
|
equals(dtoOperation.getType())) {
|
|
|
|
|
equals(dtoOperation
|
|
|
|
|
.getType())) {
|
|
|
|
|
dtoOperation = profileOperationDAO.getOperation(dtoOperation.getId());
|
|
|
|
|
} else if (org.wso2.carbon.device.mgt.core.dto.operation.mgt.Operation.Type.POLICY.
|
|
|
|
|
equals(dtoOperation.getType())) {
|
|
|
|
|
equals(dtoOperation
|
|
|
|
|
.getType())) {
|
|
|
|
|
dtoOperation = policyOperationDAO.getOperation(dtoOperation.getId());
|
|
|
|
|
}
|
|
|
|
|
operation = OperationDAOUtil.convertOperation(dtoOperation);
|
|
|
|
@ -400,7 +464,8 @@ public class OperationManagerImpl implements OperationManager {
|
|
|
|
|
|
|
|
|
|
if (!isActionAuthorized(deviceId)) {
|
|
|
|
|
throw new OperationManagementException("User '" + getUser() + "' is not authorized to access the '" +
|
|
|
|
|
deviceId.getType() + "' device, which carries the identifier '" + deviceId.getId() + "'");
|
|
|
|
|
deviceId.getType() + "' device, which carries the identifier '" +
|
|
|
|
|
deviceId.getId() + "'");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int enrolmentId = this.getEnrolmentByStatus(deviceId, EnrolmentInfo.Status.ACTIVE);
|
|
|
|
@ -410,8 +475,10 @@ public class OperationManagerImpl implements OperationManager {
|
|
|
|
|
boolean isUpdated = false;
|
|
|
|
|
if (operation.getStatus() != null) {
|
|
|
|
|
isUpdated = operationDAO.updateOperationStatus(enrolmentId, operationId,
|
|
|
|
|
org.wso2.carbon.device.mgt.core.dto.operation.mgt.Operation.Status.
|
|
|
|
|
valueOf(operation.getStatus().toString()));
|
|
|
|
|
org.wso2.carbon.device.mgt.core.dto.operation.mgt.Operation.Status
|
|
|
|
|
.
|
|
|
|
|
valueOf(operation.getStatus()
|
|
|
|
|
.toString()));
|
|
|
|
|
}
|
|
|
|
|
if (isUpdated && operation.getOperationResponse() != null) {
|
|
|
|
|
operationDAO.addOperationResponse(enrolmentId, operationId, operation.getOperationResponse());
|
|
|
|
@ -461,7 +528,8 @@ public class OperationManagerImpl implements OperationManager {
|
|
|
|
|
|
|
|
|
|
if (!isActionAuthorized(deviceId)) {
|
|
|
|
|
throw new OperationManagementException("User '" + getUser() + "' is not authorized to access the '" +
|
|
|
|
|
deviceId.getType() + "' device, which carries the identifier '" + deviceId.getId() + "'");
|
|
|
|
|
deviceId.getType() + "' device, which carries the identifier '" +
|
|
|
|
|
deviceId.getId() + "'");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int enrolmentId = this.getEnrolmentByStatus(deviceId, EnrolmentInfo.Status.ACTIVE);
|
|
|
|
@ -473,13 +541,17 @@ public class OperationManagerImpl implements OperationManager {
|
|
|
|
|
try {
|
|
|
|
|
OperationManagementDAOFactory.openConnection();
|
|
|
|
|
org.wso2.carbon.device.mgt.core.dto.operation.mgt.Operation dtoOperation = operationDAO.
|
|
|
|
|
getOperationByDeviceAndId(enrolmentId, operationId);
|
|
|
|
|
getOperationByDeviceAndId(
|
|
|
|
|
enrolmentId,
|
|
|
|
|
operationId);
|
|
|
|
|
if (dtoOperation.getType().
|
|
|
|
|
equals(org.wso2.carbon.device.mgt.core.dto.operation.mgt.Operation.Type.COMMAND)) {
|
|
|
|
|
org.wso2.carbon.device.mgt.core.dto.operation.mgt.CommandOperation commandOperation;
|
|
|
|
|
commandOperation =
|
|
|
|
|
(org.wso2.carbon.device.mgt.core.dto.operation.mgt.CommandOperation) commandOperationDAO.
|
|
|
|
|
getOperation(dtoOperation.getId());
|
|
|
|
|
getOperation(
|
|
|
|
|
dtoOperation
|
|
|
|
|
.getId());
|
|
|
|
|
dtoOperation.setEnabled(commandOperation.isEnabled());
|
|
|
|
|
} else if (dtoOperation.getType().
|
|
|
|
|
equals(org.wso2.carbon.device.mgt.core.dto.operation.mgt.Operation.Type.CONFIG)) {
|
|
|
|
@ -519,7 +591,8 @@ public class OperationManagerImpl implements OperationManager {
|
|
|
|
|
|
|
|
|
|
if (!isActionAuthorized(deviceId)) {
|
|
|
|
|
throw new OperationManagementException("User '" + getUser() + "' is not authorized to access the '" +
|
|
|
|
|
deviceId.getType() + "' device, which carries the identifier '" + deviceId.getId() + "'");
|
|
|
|
|
deviceId.getType() + "' device, which carries the identifier '" +
|
|
|
|
|
deviceId.getId() + "'");
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
int enrolmentId = this.getEnrolmentByStatus(deviceId, EnrolmentInfo.Status.ACTIVE);
|
|
|
|
@ -568,16 +641,20 @@ public class OperationManagerImpl implements OperationManager {
|
|
|
|
|
try {
|
|
|
|
|
OperationManagementDAOFactory.openConnection();
|
|
|
|
|
org.wso2.carbon.device.mgt.core.dto.operation.mgt.Operation dtoOperation = operationDAO.
|
|
|
|
|
getOperation(operationId);
|
|
|
|
|
getOperation(
|
|
|
|
|
operationId);
|
|
|
|
|
if (dtoOperation == null) {
|
|
|
|
|
throw new OperationManagementException("Operation not found for given Id:" + operationId);
|
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
if (dtoOperation.getType().equals(org.wso2.carbon.device.mgt.core.dto.operation.mgt.Operation.Type.COMMAND)) {
|
|
|
|
|
if (dtoOperation.getType()
|
|
|
|
|
.equals(org.wso2.carbon.device.mgt.core.dto.operation.mgt.Operation.Type.COMMAND)) {
|
|
|
|
|
org.wso2.carbon.device.mgt.core.dto.operation.mgt.CommandOperation commandOperation;
|
|
|
|
|
commandOperation =
|
|
|
|
|
(org.wso2.carbon.device.mgt.core.dto.operation.mgt.CommandOperation) commandOperationDAO.
|
|
|
|
|
getOperation(dtoOperation.getId());
|
|
|
|
|
getOperation(
|
|
|
|
|
dtoOperation
|
|
|
|
|
.getId());
|
|
|
|
|
dtoOperation.setEnabled(commandOperation.isEnabled());
|
|
|
|
|
} else if (dtoOperation.getType().
|
|
|
|
|
equals(org.wso2.carbon.device.mgt.core.dto.operation.mgt.Operation.Type.CONFIG)) {
|
|
|
|
|