| Oracle® Fusion Middleware Developer's Guide for Oracle Information Rights Management Server Release 11.1.1.2.1 Part Number E12326-01 |
|
|
View PDF |
This section contains the following topics:
The following section provides sample code that can be used with JAX-WS web service proxies generated using JDeveloper 11g.
The JDeveloper 11g sample code comes packaged with a pre-generated set of web service proxy code so there is no need to generate the web service proxy code. The code samples in this document do not show this generated code, but assume this code is present in a package called generated. The easiest way to use the samples is to import them directly into a new or existing JDeveloper 11g project using the File > Import > Java Source menu.
Note:
Before running each sample, check the code to see what command line arguments the sample requires.If the web service proxy code needs to be generated by hand, these are the steps to follow within JDeveloper 11g:
From the File menu, select New, then Business Tier, then Web Services, then Web Service Proxy.
Select a JAX-WS Style client and press Next.
Enter the required WSDL document URL as listed in the Web Services section of this document.
For example, http://irm.example.com/irm_sealing/sealing_services?wsdl
There is no need to copy the WSDL into the project.
Press Next.
Select Run against a service deployed to an external server.
Press Finish.
The following code demonstrates how to create a domain. The sample code uses a fixed domain UUID so that all sample code can work against a known domain. A new domain would typically be given a new random UUID value. The authenticated user becomes the domain administrator. When a domain is created, a set of human-readable labels can be given to the domain for the target language audience.
Example 5-1
import generated.Domain;
import generated.DomainOperations;
import generated.DomainOperationsService;
import generated.Label;
import java.net.Authenticator;
import java.net.PasswordAuthentication;
import java.util.Locale;
import java.util.Map;
import javax.xml.ws.BindingProvider;
public class SaveNewDomain {
public static void main(String[] args) throws Exception {
final String endpointAddress = args[0];
final String username = args[1];
final String password = args[2];
// Configure an authenticator to provide the credentials
// for the web service
Authenticator.setDefault(new Authenticator() {
@Override
protected PasswordAuthentication getPasswordAuthentication() {
return new PasswordAuthentication(username, password.toCharArray());
}
});
The following code demonstrates how to create a role. The sample code uses a fixed role UUID so that all sample code can work with a known role. A new role would typically be given a new random UUID value. The sample role is set up to allow all the content operations required by the sample code. When assigned to a user, this role allows sealing, unsealing, resealing and (validated) peeking. This is done by a providing an appropriate set of features and export constraints.
Example 5-2
import generated.DocumentRole;
import generated.DocumentRoleExportConstraints;
import generated.DocumentRoleOperations;
import generated.DocumentRoleOperationsService;
import generated.DomainRef;
import generated.Feature;
import generated.FeatureUse;
import generated.ItemConstraintsType;
import generated.Label;
import generated.LicenseCriteriaStorage;
import generated.TimePeriod;
import generated.TimePeriodUnits;
import java.net.Authenticator;
import java.net.PasswordAuthentication;
import java.util.List;
import java.util.Locale;
import java.util.Map;
import javax.xml.ws.BindingProvider;
public class SaveNewRole {
public static void main(String[] args) throws Exception {
final String endpointAddress = args[0];
final String username = args[1];
final String password = args[2];
// Configure an authenticator to provide the credentials
// for the web service
Authenticator.setDefault(new Authenticator() {
@Override
protected PasswordAuthentication getPasswordAuthentication() {
return new PasswordAuthentication(username, password.toCharArray());
}
});
// Get the document role operations web service
DocumentRoleOperationsService service = new DocumentRoleOperationsService();
DocumentRoleOperations roleOperations = service.getDocumentRoleOperations();
// Set the end point address
Map<String, Object> requestContext = ((BindingProvider)roleOperations).getRequestContext();
requestContext.put(BindingProvider.ENDPOINT_ADDRESS_PROPERTY, endpointAddress);
// The Role UUID value - that identifies this role within the domain -
// is fixed for sample code
DocumentRole role = new DocumentRole();
role.setUuid("ee82c3f9-152b-440d-afd7-dbf36b0c8188");
// Role has one English label
Label label = new Label();
label.setLocale(Locale.ENGLISH.toString());
label.setName("Sample Role");
label.setDescription("This is a role created from sample code.");
role.getLabels().add(label);
// This role allows the user to access content while offline by persisting licenses on the desktop
role.setStorage(LicenseCriteriaStorage.PERSISTENT);
// This role allows content to be saved in the clear (unsealing and copying)
role.setExportConstraints(DocumentRoleExportConstraints.NONE);
// This role allows opening,
Feature open = new Feature();
open.setId("oracle.irm.generic.Open");
open.setUse(FeatureUse.IMMEDIATE);
open.setRecord(false);
// sealing,
Feature seal = new Feature();
seal.setId("oracle.irm.generic.Seal");
seal.setUse(FeatureUse.IMMEDIATE);
seal.setRecord(false);
// and resealing.
Feature reseal = new Feature();
reseal.setId("oracle.irm.generic.Reseal");
reseal.setUse(FeatureUse.IMMEDIATE);
reseal.setRecord(false);
List<Feature> features = role.getFeatures();
features.add(open);
features.add(seal);
features.add(reseal);
// Role allows document exclusions to be listed, by default all items are allowed
role.setItemConstraints(ItemConstraintsType.EXCLUSIONS);
// This role allows content to be opened for one hour before refreshing the rights from the server
// This role has no additional time constraints
TimePeriod value = new TimePeriod();
value.setAmount(1);
value.setUnits(TimePeriodUnits.HOURS);
role.setRefreshPeriod(value);
// Domain UUID is fixed for sample code
DomainRef domain = new DomainRef();
domain.setUuid("6fab93fd-2858-461a-a0b3-34e261dbf8fd");
// Save the new role
roleOperations.saveNewRole(domain, role);
}
}
The following code demonstrates how to create a context template. The sample code uses a fixed template UUID so that all sample code can work with a known template. A new template would typically be given a new random UUID value. The sample template has one role and is active. This template is used to create contexts in the create context code sample.
The following code demonstrates how to create a context from a context template. The sample code uses a fixed context template reference (information that identifies the template) and provides a fixed UUID value for the new context. The authenticated user becomes the context manager. The context is created with two labels, English and German. This context is used in the sample code that assigns a role, as well as the sealing, unsealing, resealing, reclassification and peeking code samples.
Example 5-4
import generated.ContextInstanceVisibility;
import generated.ContextOperations;
import generated.ContextOperationsService;
import generated.ContextTemplateRef;
import generated.DomainRef;
import generated.Label;
import java.net.Authenticator;
import java.net.PasswordAuthentication;
import java.util.ArrayList;
import java.util.List;
import java.util.Locale;
import java.util.Map;
import javax.xml.ws.BindingProvider;
public class CreateContextFromTemplate {
public static void main(String[] args) throws Exception {
final String endpointAddress = args[0];
final String username = args[1];
final String password = args[2];
// Configure an authenticator to provide the credentials
// for the web service
Authenticator.setDefault(new Authenticator() {
@Override
protected PasswordAuthentication getPasswordAuthentication() {
return new PasswordAuthentication(username, password.toCharArray());
}
});
// Get the content operations endpoint
ContextOperationsService service = new ContextOperationsService();
ContextOperations contextOperations = service.getContextOperations();
// Set the end point address
Map<String, Object> requestContext = ((BindingProvider)contextOperations).getRequestContext();
requestContext.put(BindingProvider.ENDPOINT_ADDRESS_PROPERTY, endpointAddress);
// Domain UUID is fixed for sample code
DomainRef domain = new DomainRef();
domain.setUuid("6fab93fd-2858-461a-a0b3-34e261dbf8fd");
// Create the context template reference
ContextTemplateRef templateRef = new ContextTemplateRef();
templateRef.setDomain(domain);
// Context Template UUID is for the "standard" template automatically installed with a domain
templateRef.setUuid("930876e6-a505-4a10-8d93-bc43d9a37c23");
templateRef.setDomain(domain);
// Context UUID is fixed for sample code
String contextUUID = "46f910d9-dd30-476e-b060-4d01f88f8b05";
// Context has two labels, English and German
Label english = new Label();
english.setLocale(Locale.ENGLISH.toString());
english.setName("Sample Classification");
english.setDescription("Created from sample code.");
Label german = new Label();
german.setLocale(Locale.GERMAN.toString());
german.setName("Beispielklassifikation");
german.setDescription("Verursacht vom Beispielcode.");
List<Label> labels = new ArrayList<Label>();
labels.add(english);
labels.add(german);
// Create a context based on that template
contextOperations.createContextFromTemplate(
contextUUID, // context UUID value
templateRef, // context template
labels, // labels
ContextInstanceVisibility.DOMAIN, // visibility
null); // additional context managers
}
}
The following code demonstrates how to assign a role to a user. To assign a role, the role, context and user or group must be specified. If the role is restricted to individual items then items can also be specified as in the assign role method.
Example 5-5
import generated.AccountRef;
import generated.ContextInstanceRef;
import generated.DocumentRightOperations;
import generated.DocumentRightOperationsService;
import generated.DocumentRoleRef;
import generated.DomainRef;
import java.net.Authenticator;
import java.net.PasswordAuthentication;
import java.net.URLEncoder;
import java.util.Collections;
import java.util.Map;
import javax.xml.ws.BindingProvider;
public class AssignRole {
public static void main(String[] args) throws Exception {
final String endpointAddress = args[0];
final String username = args[1];
final String password = args[2];
// Configure an authenticator to provide the credentials
// for the web service
Authenticator.setDefault(new Authenticator() {
@Override
protected PasswordAuthentication getPasswordAuthentication() {
return new PasswordAuthentication(username, password.toCharArray());
}
});
// Get the document right operations endpoint
DocumentRightOperationsService service = new DocumentRightOperationsService();
DocumentRightOperations rightOperations = service.getDocumentRightOperations();
// Set the end point address
Map<String, Object> requestContext = ((BindingProvider)rightOperations).getRequestContext();
requestContext.put(BindingProvider.ENDPOINT_ADDRESS_PROPERTY, endpointAddress);
// Domain UUID is fixed for sample code
DomainRef domainRef = new DomainRef();
domainRef.setUuid("6fab93fd-2858-461a-a0b3-34e261dbf8fd");
// Document Role UUID is for the "Sample Role" role
DocumentRoleRef roleRef = new DocumentRoleRef();
roleRef.setUuid("ee82c3f9-152b-440d-afd7-dbf36b0c8188");
roleRef.setDomain(domainRef);
// Context UUID is fixed for sample code
ContextInstanceRef contextInstanceRef = new ContextInstanceRef();
contextInstanceRef.setUuid("46f910d9-dd30-476e-b060-4d01f88f8b05");
// Reference the account by user name
AccountRef accountRef = new AccountRef();
accountRef.setUuid("urn:user:" + URLEncoder.encode(username, "utf-8"));
// Assign the role to the account
rightOperations.assignRole(
contextInstanceRef,
roleRef,
Collections.singletonList(accountRef),
null); // no item constraints
}
}
The following code demonstrates how to list the rights that have been assigned to a user or group. The code displays the role label and the context UUID from each right.
Example 5-6
import generated.AccountRef;
import generated.DocumentRight;
import generated.DocumentRightOperations;
import generated.DocumentRightOperationsService;
import generated.ItemCode;
import java.net.Authenticator;
import java.net.PasswordAuthentication;
import java.net.URLEncoder;
import java.util.Collection;
import java.util.Map;
import javax.xml.ws.BindingProvider;
public class ListRightsByAccount {
public static void main(String[] args) throws Exception {
final String endpointAddress = args[0];
final String username = args[1];
final String password = args[2];
// Configure an authenticator to provide the credentials
// for the web service
Authenticator.setDefault(new Authenticator() {
@Override
protected PasswordAuthentication getPasswordAuthentication() {
return new PasswordAuthentication(username, password.toCharArray());
}
});
// Get the document right operations endpoint
DocumentRightOperationsService service = new DocumentRightOperationsService();
DocumentRightOperations rightOperations = service.getDocumentRightOperations();
// Set the end point address
Map<String, Object> requestContext = ((BindingProvider)rightOperations).getRequestContext();
requestContext.put(BindingProvider.ENDPOINT_ADDRESS_PROPERTY, endpointAddress);
// Reference the account by user name, allowed formats are
// urn:user:xxxx
// urn:group:xxxx
// 00000000-0000-0000-0000-000000000000
AccountRef accountRef = new AccountRef();
accountRef.setUuid("urn:user:" + URLEncoder.encode(username, "utf-8"));
// Get all of the rights assigned to the account
Collection<DocumentRight> rights = rightOperations.listRightsByAccount(accountRef);
// Display a summary of each right
for (DocumentRight right : rights) {
System.out.println("Account: " + right.getAccount().getUuid());
System.out.println("Context: " + right.getContext().getUuid());
System.out.println("Role: " + right.getRole().getUuid());
// Show items
Collection<ItemCode> itemCodes = right.getItemCodes();
if (itemCodes != null) {
for (ItemCode itemCode : itemCodes) {
System.out.println(" ItemCode: " + itemCode.getValue());
}
}
}
}
}
The following code demonstrates how to alter a role assignment using the reassignRole method over web services. The sample code adds an item code exclusion to a role assignment. Typically this method is used to alter the role, but as the sample code only has one demonstration role it shows how to alter the item restrictions.
Example 5-7
import generated.AccountRef;
import generated.DocumentRight;
import generated.DocumentRightOperations;
import generated.DocumentRightOperationsService;
import generated.DocumentRightRef;
import generated.DocumentRoleRef;
import generated.DomainRef;
import generated.ItemCode;
import java.net.Authenticator;
import java.net.PasswordAuthentication;
import java.net.URLEncoder;
import java.util.Collections;
import java.util.List;
import java.util.Map;
import javax.xml.ws.BindingProvider;
public class ReassignRole {
public static void main(String[] args) throws Exception {
final String endpointAddress = args[0];
final String username = args[1];
final String password = args[2];
// Configure an authenticator to provide the credentials
// for the web service
Authenticator.setDefault(new Authenticator() {
@Override
protected PasswordAuthentication getPasswordAuthentication() {
return new PasswordAuthentication(username, password.toCharArray());
}
});
// Get the document right operations endpoint
DocumentRightOperationsService service = new DocumentRightOperationsService();
DocumentRightOperations rightOperations = service.getDocumentRightOperations();
// Set the end point address
Map<String, Object> requestContext = ((BindingProvider)rightOperations).getRequestContext();
requestContext.put(BindingProvider.ENDPOINT_ADDRESS_PROPERTY, endpointAddress);
// Reference the account by user name
AccountRef accountRef = new AccountRef();
accountRef.setUuid("urn:user:" + URLEncoder.encode(username, "utf-8"));
// Get all rights assigned to the account
List<DocumentRight> rights = rightOperations.listRightsByAccount(accountRef);
// Take the first one on the list
DocumentRight right = rights.get(0);
DocumentRightRef rightRef = new DocumentRightRef();
rightRef.setUuid(right.getUuid());
// Get a reference to the role to be reassigned
DomainRef domainRef = right.getRole().getDomain();
DocumentRoleRef roleRef = new DocumentRoleRef();
roleRef.setUuid(right.getRole().getUuid());
roleRef.setDomain(domainRef);
// Change the item exclusion list to contain one sample item
ItemCode itemCode = new ItemCode();
itemCode.setValue("sample-item-code");
// Reassign the role to the account
rightOperations.reassignRole(Collections.singletonList(rightRef),
roleRef, Collections.singletonList(itemCode));
}
}
The following code demonstrates how to seal a file. The content to seal can be provided as any type of InputStream; this example uses a file input stream. The sample writes the resulting stream out as a file with a sealed file name inferred from the unsealed file name. The file is sealed using the context classification system, specifying a context with a known UUID value and an item code.
Example 5-8
import generated.Classification;
import generated.ClassificationSystemRef;
import generated.ContentType;
import generated.ContentTypeOperations;
import generated.ContentTypeOperationsService;
import generated.SealingOptions;
import generated.SealingServices;
import generated.SealingServicesService;
import java.io.File;
import java.io.FileOutputStream;
import java.io.StringReader;
import java.util.GregorianCalendar;
import java.util.Map;
import javax.activation.DataHandler;
import javax.activation.FileDataSource;
import javax.xml.datatype.DatatypeFactory;
import javax.xml.datatype.XMLGregorianCalendar;
import javax.xml.parsers.DocumentBuilder;
import javax.xml.parsers.DocumentBuilderFactory;
import javax.xml.ws.BindingProvider;
import org.w3c.dom.Document;
import org.w3c.dom.Element;
import org.xml.sax.InputSource;
import com.sun.xml.ws.developer.JAXWSProperties;
public class SealFile {
/**
* MTOM threshold.
*
* The size in bytes that binary data should be before being sent as an attachment in the
* web service request or response.
*
* <br/><br/>Value: <tt>{@value}</tt>
*/
static public final int MTOM_THRESHOLD = 16384;
public static void main(String[] args) throws Exception {
String hostPort = args[0];
String username = args[1];
String password = args[2];
// The server URI. e.g. https://irm.example.com/irm_desktop
String serverURI = args[3];
// The filename to seal
String filename = args[4];
// Context UUID is fixed for sample code
String contextUUID = "46f910d9-dd30-476e-b060-4d01f88f8b05";
// Date for the item code time stamp
DatatypeFactory dataTypeFactory = DatatypeFactory.newInstance();
XMLGregorianCalendar date = dataTypeFactory.newXMLGregorianCalendar(
new GregorianCalendar());
// Create a context cookie for the classification - this specifies which context to use as
// well as the item code for the content.
//
// Specifies an explicit item code value and time.
String cookieXMLText =
"<?xml version=\"1.0\" encoding=\"UTF-8\"?>" +
"<classifications:ContextCookie xmlns:classifications=\"http://xmlns.oracle.com/irm/classifications\">" +
" <context>" +
" <uuid>" + contextUUID + "</uuid>" +
" </context>" + " <itemCode>" +
" <value>" + new File(filename).getName() + "</value>" +
" <time>" + date.toString() + "</time>" +
" </itemCode>" + "</classifications:ContextCookie>";
DocumentBuilderFactory factory = DocumentBuilderFactory.newInstance();
DocumentBuilder builder = factory.newDocumentBuilder();
Document document = builder.parse(new InputSource(new StringReader(
cookieXMLText.toString())));
Element cookieElement = document.getDocumentElement();
// Create the classification details used in the sealing options
Classification classification = new Classification();
// For the context classification system the classification Id is the context UUID value.
classification.setId("46f910d9-dd30-476e-b060-4d01f88f8b05");
// Context classification system
ClassificationSystemRef contextSystemRef = new ClassificationSystemRef();
contextSystemRef.setUuid("37c8da32-5420-4146-816c-27f63de27250");
classification.setSystem(contextSystemRef);
// As the key set is not known get the sealing process to automatically fill this in
classification.setKeySet(null);
// URL sealed into content that tells the desktop where to go to get licenses
classification.setUri(serverURI);
// Classification time set explicitly to the current time
classification.setClassificationTime(date);
// Set the context and item code details
classification.setAny(cookieElement);
// The classification is the only mandatory property for sealing options
SealingOptions sealingOptions = new SealingOptions();
sealingOptions.setClassification(classification);
// Get the content type operations web service proxy
ContentTypeOperationsService contentTypeOperationsService =
new ContentTypeOperationsService();
ContentTypeOperations contentTypeOperations =
contentTypeOperationsService.getContentTypeOperations();
// Set the end point address for content type operations
Map<String, Object> requestContext = ((BindingProvider)contentTypeOperations).getRequestContext();
requestContext.put(BindingProvider.ENDPOINT_ADDRESS_PROPERTY, hostPort + "/irm_sealing/content_type_operations");
// Set the user name and password for content type operations
requestContext.put(BindingProvider.USERNAME_PROPERTY, username);
requestContext.put(BindingProvider.PASSWORD_PROPERTY, password);
// Get the MIME type of the file to seal, this is inferred from the unsealed file name
ContentType contentType = contentTypeOperations.getContentTypeFromPath(filename);
String mimeType = contentType.getMimeTypes().get(0);
// Get the sealing services web service proxy
SealingServicesService sealingServicesService = new SealingServicesService();
SealingServices sealingServices = sealingServicesService.getSealingServices(
new javax.xml.ws.soap.MTOMFeature(true, MTOM_THRESHOLD));
// Set the end point address for sealing services
requestContext = ((BindingProvider)sealingServices).getRequestContext();
requestContext.put(BindingProvider.ENDPOINT_ADDRESS_PROPERTY, hostPort + "/irm_sealing/sealing_services");
// Set the user name and password for sealing services
requestContext.put(BindingProvider.USERNAME_PROPERTY, username);
requestContext.put(BindingProvider.PASSWORD_PROPERTY, password);
// Without this setting the client may get an java.lang.OutOfMemoryException
// when large files are buffered into memory by the HTTP stack.
//
// For more information see:
// https://jax-ws.dev.java.net/guide/HTTP_client_streaming_support.html
// https://jax-ws.dev.java.net/guide/Large_Attachments.html
requestContext.put(JAXWSProperties.HTTP_CLIENT_STREAMING_CHUNK_SIZE, 4096);
// Send the file contents to the server for sealing
DataHandler input = new DataHandler(new FileDataSource(filename));
DataHandler results = sealingServices.seal(input, mimeType, sealingOptions);
// Get the sealed equivalent of the unsealed filename
String sealedFilename = contentTypeOperations.getSealedFileName(filename);
// Write the stream out to a file
FileOutputStream outputStream = new FileOutputStream(sealedFilename);
results.writeTo(
outputStream);
// Close the streams
outputStream.close();
}
}
The following code demonstrates how to extract the metadata from sealed content using the peek method. This method sends the sealed content to the sealing server, the server extracts the metadata and returns this information to the caller. The sealed content can be provided as any type of InputStream; this example uses a file input stream. Once peeked the file metadata, which includes the Classification details, can be examined. The sample code prints out the human readable classification details (the labels) that were sealed into the content.
Example 5-9
import generated.Classification;
import generated.ContentDescription;
import generated.Label;
import generated.SealingServices;
import generated.SealingServicesService;
import java.util.Map;
import javax.activation.DataHandler;
import javax.activation.FileDataSource;
import javax.xml.ws.BindingProvider;
import com.sun.xml.ws.developer.JAXWSProperties;
public class PeekFile {
/**
* MTOM threshold.
*
* The size in bytes that binary data should be before being sent as an attachment in the
* web service request or response.
*
* <br/><br/>Value: <tt>{@value}</tt>
*/
static public final int MTOM_THRESHOLD = 16384;
public static void main(String[] args) throws Exception {
String endpointAddress = args[0];
String username = args[1];
String password = args[2];
// The name of the file to peek
String filename = args[3];
// Get the sealing services web service proxy
SealingServicesService sealingServicesService = new SealingServicesService();
SealingServices sealingServices = sealingServicesService.getSealingServices(
new javax.xml.ws.soap.MTOMFeature(true, MTOM_THRESHOLD));
// Set the end point address
Map<String, Object> requestContext = ((BindingProvider)sealingServices).getRequestContext();
requestContext.put(BindingProvider.ENDPOINT_ADDRESS_PROPERTY, endpointAddress);
// Set the user name and password
requestContext.put(BindingProvider.USERNAME_PROPERTY, username);
requestContext.put(BindingProvider.PASSWORD_PROPERTY, password);
// Without this setting the client may get an java.lang.OutOfMemoryException
// when large files are buffered into memory by the HTTP stack.
//
// For more information see:
// https://jax-ws.dev.java.net/guide/HTTP_client_streaming_support.html
// https://jax-ws.dev.java.net/guide/Large_Attachments.html
requestContext.put(JAXWSProperties.HTTP_CLIENT_STREAMING_CHUNK_SIZE, 4096);
// Perform the peek, providing a stream to the sealed file
DataHandler input = new DataHandler(new FileDataSource(filename));
ContentDescription results = sealingServices.peek(input);
// Extract the classification details from the content
Classification classification = results.getClassification();
// Show all the labels sealed into content (assumes labels are available)
for (Label label : classification.getLabels()) {
System.out.println(label.getLocale() + " : " + label.getName());
}
}
}
The following code demonstrates how to extract the metadata from sealed content using the validatedPeek method. This method sends the sealed content to the sealing server, the server extracts the metadata and returns this information to the caller. The sealed content can be provided as any type of InputStream; this example uses a file input stream. Once peeked the file metadata, which includes the Classification details, can be examined. The sample code prints out the human readable classification details (the labels) that were sealed into the content.
Example 5-10
import generated.Classification;
import generated.ContentDescription;
import generated.Label;
import generated.SealingServices;
import generated.SealingServicesService;
import java.util.Map;
import javax.activation.DataHandler;
import javax.activation.FileDataSource;
import javax.xml.ws.BindingProvider;
import com.sun.xml.ws.developer.JAXWSProperties;
public class ValidatedPeekFile {
/**
* MTOM threshold.
*
* The size in bytes that binary data should be before being sent as an attachment in the
* web service request or response.
*
* <br/><br/>Value: <tt>{@value}</tt>
*/
static public final int MTOM_THRESHOLD = 16384;
public static void main(String[] args) throws Exception {
String endpointAddress = args[0];
String username = args[1];
String password = args[2];
// The name of the file to peek
String filename = args[3];
// Get the sealing services web service proxy
SealingServicesService sealingServicesService = new SealingServicesService();
SealingServices sealingServices = sealingServicesService.getSealingServices(
new javax.xml.ws.soap.MTOMFeature(true, MTOM_THRESHOLD));
// Set the end point address
Map<String, Object> requestContext = ((BindingProvider)sealingServices).getRequestContext();
requestContext.put(BindingProvider.ENDPOINT_ADDRESS_PROPERTY, endpointAddress);
// Set the user name and password
requestContext.put(BindingProvider.USERNAME_PROPERTY, username);
requestContext.put(BindingProvider.PASSWORD_PROPERTY, password);
// Without this setting the client may get an java.lang.OutOfMemoryException
// when large files are buffered into memory by the HTTP stack.
//
// For more information see:
// https://jax-ws.dev.java.net/guide/HTTP_client_streaming_support.html
// https://jax-ws.dev.java.net/guide/Large_Attachments.html
requestContext.put(JAXWSProperties.HTTP_CLIENT_STREAMING_CHUNK_SIZE, 4096);
// Send the file contents to the server for peeking
DataHandler input = new DataHandler(new FileDataSource(filename));
ContentDescription results = sealingServices.validatedPeek(input);
// Extract the classification details from the content
Classification classification = results.getClassification();
// Show all the labels sealed into content (assumes labels are available)
for (Label label : classification.getLabels()) {
System.out.println(label.getLocale() + " : " + label.getName());
}
}
}
The following code demonstrates how to alter the item locks or exclusions associated with a right. The sample code replaces one item code with two item codes.
Example 5-11
import generated.AccountRef;
import generated.DocumentRight;
import generated.DocumentRightOperations;
import generated.DocumentRightOperationsService;
import generated.DocumentRightRef;
import generated.ItemCode;
import java.net.Authenticator;
import java.net.PasswordAuthentication;
import java.net.URLEncoder;
import java.util.ArrayList;
import java.util.Collections;
import java.util.GregorianCalendar;
import java.util.List;
import java.util.Map;
import javax.xml.datatype.DatatypeFactory;
import javax.xml.ws.BindingProvider;
public class SaveChangesToItems {
public static void main(String[] args) throws Exception {
final String endpointAddress = args[0];
final String username = args[1];
final String password = args[2];
// Configure an authenticator to provide the credentials
// for the web service
Authenticator.setDefault(new Authenticator() {
@Override
protected PasswordAuthentication getPasswordAuthentication() {
return new PasswordAuthentication(username, password.toCharArray());
}
});
// Get the document right operations endpoint
DocumentRightOperationsService service = new DocumentRightOperationsService();
DocumentRightOperations rightOperations = service.getDocumentRightOperations();
// Set the end point address
Map<String, Object> requestContext = ((BindingProvider)rightOperations).getRequestContext();
requestContext.put(BindingProvider.ENDPOINT_ADDRESS_PROPERTY, endpointAddress);
// Reference the account by user name
AccountRef accountRef = new AccountRef();
accountRef.setUuid("urn:user:" + URLEncoder.encode(username, "utf-8"));
// Get all rights assigned to the account
List<DocumentRight> rights = rightOperations.listRightsByAccount(accountRef);
// Take the first one on the list
DocumentRight right = rights.get(0);
DocumentRightRef rightRef = new DocumentRightRef();
rightRef.setUuid(right.getUuid());
// The save change method allows items to be added and/or removed in the same call.
// It does this be comparing two sets of items and applying the differences.
// Item codes
ItemCode sampleItemCode = new ItemCode();
sampleItemCode.setValue("sample-item-code");
DatatypeFactory datatypeFactory = DatatypeFactory.newInstance();
ItemCode sampleItemCodeOne = new ItemCode();
sampleItemCodeOne.setValue("sample-item-code-one");
sampleItemCodeOne.setTime(datatypeFactory.newXMLGregorianCalendar(new GregorianCalendar()));
ItemCode sampleItemCodeTwo = new ItemCode();
sampleItemCodeTwo.setValue("sample-item-code-two");
sampleItemCodeTwo.setTime(datatypeFactory.newXMLGregorianCalendar(new GregorianCalendar()));
// This example shows a delta where item "sample-item-code" is removed
// and items "sample-item-code-one" and "sample-item-code-two" are added.
List<ItemCode> itemCodes = Collections.singletonList(sampleItemCode);
List<ItemCode> deltaItemCodes = new ArrayList<ItemCode>();
deltaItemCodes.add(sampleItemCodeOne);
deltaItemCodes.add(sampleItemCodeTwo);
// Alter the items
rightOperations.saveChangesToItems(Collections.singletonList(rightRef),
itemCodes, deltaItemCodes);
}
}
The following code demonstrates how to unassign rights that have been assigned to a user. The sample first lists all the rights directly assigned to the user and unassigns them. To unassign the right the authenticated user must be a context manager for the related context.
Example 5-12
import generated.AccountRef;
import generated.DocumentRight;
import generated.DocumentRightOperations;
import generated.DocumentRightOperationsService;
import generated.DocumentRightRef;
import java.net.Authenticator;
import java.net.PasswordAuthentication;
import java.net.URLEncoder;
import java.util.ArrayList;
import java.util.List;
import java.util.Map;
import javax.xml.ws.BindingProvider;
public class UnassignRights {
public static void main(String[] args) throws Exception {
final String endpointAddress = args[0];
final String username = args[1];
final String password = args[2];
// Configure an authenticator to provide the credentials
// for the web service
Authenticator.setDefault(new Authenticator() {
@Override
protected PasswordAuthentication getPasswordAuthentication() {
return new PasswordAuthentication(username, password.toCharArray());
}
});
// Get the document right operations endpoint
DocumentRightOperationsService service = new DocumentRightOperationsService();
DocumentRightOperations rightOperations = service.getDocumentRightOperations();
// Set the end point address
Map<String, Object> requestContext = ((BindingProvider)rightOperations).getRequestContext();
requestContext.put(BindingProvider.ENDPOINT_ADDRESS_PROPERTY, endpointAddress);
// Reference the account by user name
AccountRef accountRef = new AccountRef();
accountRef.setUuid("urn:user:" + URLEncoder.encode(username, "utf-8"));
// Get all rights assigned to the account
List<DocumentRight> rights = rightOperations.listRightsByAccount(accountRef);
List<DocumentRightRef> rightRefs = new ArrayList<DocumentRightRef>(rights.size());
for (DocumentRight right : rights) {
DocumentRightRef rightRef = new DocumentRightRef();
rightRef.setUuid(right.getUuid());
rightRefs.add(rightRef);
}
// Unassign the rights
rightOperations.unassignRights(rightRefs);
}
}
The following code demonstrates how to reclassify a sealed file using the reclassify method. The content to reclassify can be provided as any type of InputStream; this example uses a file input stream. The sample changes the labels of the classification and then writes the resulting stream out as a file.
Example 5-13
import generated.Classification;
import generated.ContentDescription;
import generated.Label;
import generated.SealingServices;
import generated.SealingServicesService;
import java.io.FileOutputStream;
import java.util.Locale;
import java.util.Map;
import javax.activation.DataHandler;
import javax.activation.FileDataSource;
import javax.xml.ws.BindingProvider;
import com.sun.xml.ws.developer.JAXWSProperties;
public class ReclassifyFile {
/**
* MTOM threshold.
*
* The size in bytes that binary data should be before being sent as an attachment in the
* web service request or response.
*
* <br/><br/>Value: <tt>{@value}</tt>
*/
static public final int MTOM_THRESHOLD = 16384;
public static void main(String[] args) throws Exception {
String endpointAddress = args[0];
String username = args[1];
String password = args[2];
// Get the file to reclassify
String filename = args[3];
// Get the label to apply to the classification
String labelName = args[4];
// Get the sealing services web service proxy
SealingServicesService sealingServicesService = new SealingServicesService();
SealingServices sealingServices = sealingServicesService.getSealingServices(
new javax.xml.ws.soap.MTOMFeature(true, MTOM_THRESHOLD));
// Set the end point address
Map<String, Object> requestContext = ((BindingProvider)sealingServices).getRequestContext();
requestContext.put(BindingProvider.ENDPOINT_ADDRESS_PROPERTY, endpointAddress);
// Set the user name and password
requestContext.put(BindingProvider.USERNAME_PROPERTY, username);
requestContext.put(BindingProvider.PASSWORD_PROPERTY, password);
// Without this setting the client may get an java.lang.OutOfMemoryException
// when large files are buffered into memory by the HTTP stack.
//
// For more information see:
// https://jax-ws.dev.java.net/guide/HTTP_client_streaming_support.html
// https://jax-ws.dev.java.net/guide/Large_Attachments.html
requestContext.put(JAXWSProperties.HTTP_CLIENT_STREAMING_CHUNK_SIZE, 4096);
// Peek the contents of the file to obtain the classification details
DataHandler input = new DataHandler(new FileDataSource(filename));
ContentDescription contentDescription = sealingServices.peek(input);
// Extract the classification from the content description
Classification classification = contentDescription.getClassification();
// Replace the labels with one
Label label = new Label();
label.setLocale(Locale.ENGLISH.toString());
label.setName(labelName);
classification.getLabels().add(label);
// Reclassify the sealed file with the new classification
DataHandler results = sealingServices.reclassify(input,classification);
// Write the stream out to the same file
FileOutputStream outputStream = new FileOutputStream(filename);
results.writeTo(
outputStream);
// Close the streams
outputStream.close();
}
}
The following code demonstrates how to reseal a sealed file using the reseal method. The content to reseal can be provided as any type of InputStream; this example uses a file input stream. The sample adds XML-based custom data to the sealed file.
Example 5-14
import generated.CustomData;
import generated.SealingServices;
import generated.SealingServicesService;
import java.io.FileOutputStream;
import java.util.Collections;
import java.util.Map;
import java.util.UUID;
import javax.activation.DataHandler;
import javax.activation.FileDataSource;
import javax.xml.parsers.DocumentBuilder;
import javax.xml.parsers.DocumentBuilderFactory;
import javax.xml.ws.BindingProvider;
import org.w3c.dom.Document;
import org.w3c.dom.Element;
import com.sun.xml.ws.developer.JAXWSProperties;
public class ResealFile {
/**
* MTOM threshold.
*
* The size in bytes that binary data should be before being sent as an attachment in the
* web service request or response.
*
* <br/><br/>Value: <tt>{@value}</tt>
*/
static public final int MTOM_THRESHOLD = 16384;
public static void main(String[] args) throws Exception {
String endpointAddress = args[0];
String username = args[1];
String password = args[2];
// Get the file to reseal
String filename = args[3];
// Get the sealing services web service proxy
SealingServicesService sealingServicesService = new SealingServicesService();
SealingServices sealingServices = sealingServicesService.getSealingServices(
new javax.xml.ws.soap.MTOMFeature(true, MTOM_THRESHOLD));
// Set the end point address
Map<String, Object> requestContext = ((BindingProvider)sealingServices).getRequestContext();
requestContext.put(BindingProvider.ENDPOINT_ADDRESS_PROPERTY, endpointAddress);
// Set the user name and password
requestContext.put(BindingProvider.USERNAME_PROPERTY, username);
requestContext.put(BindingProvider.PASSWORD_PROPERTY, password);
// Without this setting the client may get an java.lang.OutOfMemoryException
// when large files are buffered into memory by the HTTP stack.
//
// For more information see:
// https://jax-ws.dev.java.net/guide/HTTP_client_streaming_support.html
// https://jax-ws.dev.java.net/guide/Large_Attachments.html
requestContext.put(JAXWSProperties.HTTP_CLIENT_STREAMING_CHUNK_SIZE, 4096);
// Custom data is provided as XML
DocumentBuilderFactory documentBuilderFactory = DocumentBuilderFactory.newInstance();
DocumentBuilder documentBuilder = documentBuilderFactory.newDocumentBuilder();
Document document = documentBuilder.newDocument();
Element element = document.createElement("SampleCustomData");
element.setTextContent("Some example custom data provided as an XML text element");
CustomData data = new CustomData();
// UUID identifies the custom data, in this example just use a random UUID value
data.setUuid(UUID.randomUUID().toString());
// Custom data is XML document
data.setAny(element);
// Send the sealed file contents to the server for resealing
DataHandler input = new DataHandler(new FileDataSource(filename));
DataHandler results = sealingServices.reseal(input, Collections.singletonList(data));
// Write the stream out to a file
FileOutputStream outputStream = new FileOutputStream(filename);
results.writeTo(
outputStream);
// Close the streams
outputStream.close();
}
}
The following code demonstrates how to unseal a sealed file using the unseal method. The content to unseal can be provided as any type of InputStream; this example uses a file input stream. The sample writes the resulting unsealed stream out to a file.
Example 5-15
import generated.SealingServices;
import generated.SealingServicesService;
import java.io.FileOutputStream;
import java.util.Map;
import javax.activation.DataHandler;
import javax.activation.FileDataSource;
import javax.xml.ws.BindingProvider;
import com.sun.xml.ws.developer.JAXWSProperties;
public class UnsealFile {
/**
* MTOM threshold.
*
* The size in bytes that binary data should be before being sent as an attachment in the
* web service request or response.
*
* <br/><br/>Value: <tt>{@value}</tt>
*/
static public final int MTOM_THRESHOLD = 16384;
public static void main(String[] args) throws Exception {
String endpointAddress = args[0];
String username = args[1];
String password = args[2];
// The file to unseal
String sealedFilename = args[3];
// The unsealed file name
String unsealedFilename = args[4];
// Get the sealing services web service proxy
SealingServicesService sealingServicesService = new SealingServicesService();
SealingServices sealingServices = sealingServicesService.getSealingServices(
new javax.xml.ws.soap.MTOMFeature(true, MTOM_THRESHOLD));
// Set the end point address
Map<String, Object> requestContext = ((BindingProvider)sealingServices).getRequestContext();
requestContext.put(BindingProvider.ENDPOINT_ADDRESS_PROPERTY, endpointAddress);
// Set the user name and password
requestContext.put(BindingProvider.USERNAME_PROPERTY, username);
requestContext.put(BindingProvider.PASSWORD_PROPERTY, password);
// Without this setting the client may get an java.lang.OutOfMemoryException
// when large files are buffered into memory by the HTTP stack.
//
// For more information see:
// https://jax-ws.dev.java.net/guide/HTTP_client_streaming_support.html
// https://jax-ws.dev.java.net/guide/Large_Attachments.html
requestContext.put(JAXWSProperties.HTTP_CLIENT_STREAMING_CHUNK_SIZE, 4096);
// Send the file contents to the server for unsealing
DataHandler input = new DataHandler(new FileDataSource(sealedFilename));
DataHandler results = sealingServices.unseal(input);
// Write the stream out to a file
FileOutputStream outputStream = new FileOutputStream(unsealedFilename);
results.writeTo(
outputStream);
// Close the streams
outputStream.close();
}
}
The following code demonstrates how to list classification details from a sealing server using the listClassifications method. The sample code displays the list of Classifications details available to the authenticated user.
Example 5-16
import generated.Classification;
import generated.DesktopServices;
import generated.DesktopServicesService;
import generated.Label;
import java.net.Authenticator;
import java.net.PasswordAuthentication;
import java.util.Collection;
import java.util.Map;
import javax.xml.ws.BindingProvider;
public class ListClassifications {
public static void main(String[] args) throws Exception {
final String endpointAddress = args[0];
final String username = args[1];
final String password = args[2];
// Configure an authenticator to provide the credentials
// for the web service
Authenticator.setDefault(new Authenticator() {
@Override
protected PasswordAuthentication getPasswordAuthentication() {
return new PasswordAuthentication(username, password.toCharArray());
}
});
// Get the desktop services web service
DesktopServicesService desktopServicesService = new DesktopServicesService();
DesktopServices desktopServices = desktopServicesService.getDesktopServices();
// Set the end point address
Map<String, Object> requestContext = ((BindingProvider)desktopServices).getRequestContext();
requestContext.put(BindingProvider.ENDPOINT_ADDRESS_PROPERTY, endpointAddress);
// The server URI. e.g. https://irm.example.com/irm_desktop
String serverURI = args[3];
// List classifications available to the account
Collection<Classification> classifications = desktopServices.listClassifications(serverURI);
// Display the labels of the classifications
for (Classification classification : classifications) {
for (Label label : classification.getLabels()) {
System.out.println(label.getLocale() + " : " + label.getName());
}
}
}
}
The following code demonstrates how to search the content usage for context classified content. The sample code searches for all entries for the last twenty-four hours and displays a short summary for the first one hundred entries.
Example 5-17
import generated.ContextJournalEntry;
import generated.ContextOperations;
import generated.ContextOperationsService;
import generated.PageRange;
import generated.TimeRange;
import java.net.Authenticator;
import java.net.PasswordAuthentication;
import java.util.Calendar;
import java.util.GregorianCalendar;
import java.util.List;
import java.util.Map;
import javax.xml.datatype.DatatypeFactory;
import javax.xml.datatype.XMLGregorianCalendar;
import javax.xml.ws.BindingProvider;
public class SearchJournal {
public static void main(String[] args) throws Exception {
// The server address. e.g. https://irm.example.com
final String endpointAddress = args[0];
final String username = args[1];
final String password = args[2];
// Configure an authenticator to provide the credentials
// for the web service
Authenticator.setDefault(new Authenticator() {
@Override
protected PasswordAuthentication getPasswordAuthentication() {
return new PasswordAuthentication(username, password.toCharArray());
}
});
// Get the content operations endpoint
ContextOperationsService service = new ContextOperationsService();
ContextOperations contextOperations = service.getContextOperations();
// Set the end point address
Map<String, Object> requestContext = ((BindingProvider)contextOperations).getRequestContext();
requestContext.put(BindingProvider.ENDPOINT_ADDRESS_PROPERTY, endpointAddress);
// Use a calendar to work out the time range
GregorianCalendar calendar = new GregorianCalendar();
DatatypeFactory datatypeFactory = DatatypeFactory.newInstance();
// Search for all records from the last 24 hours
XMLGregorianCalendar end = datatypeFactory.newXMLGregorianCalendar(calendar);
calendar.add(Calendar.DAY_OF_MONTH, -1);
XMLGregorianCalendar begin = datatypeFactory.newXMLGregorianCalendar(calendar);
TimeRange timeRange = new TimeRange();
timeRange.setBegin(begin);
timeRange.setEnd(end);
// Search the context journal
PageRange pageRange = new PageRange();
pageRange.setFirst(1);
pageRange.setLast(100);
List<ContextJournalEntry> journalResults = contextOperations.searchJournal(
null, // no accounts filter
null, // no item codes filter
timeRange,
pageRange,
null); // no sorting details
if (journalResults.size() == 0)
return;
// Display the timestamp, URI and and feature for each entry
for (ContextJournalEntry entry : journalResults) {
System.out.print("Timestamp : " + entry.getTime());
System.out.print(" Account : " + entry.getAccount().getName());
System.out.print(" Content : " + (entry.getUri() != null ? entry.getUri() : ""));
System.out.print(" Feature : " + entry.getFeature().getId());
}
}
}
The following code demonstrates how to check in licenses currently checked out to a sealing server. When the sealing server processes content it will usually check out licenses for the authenticated user. These licenses can no longer be used from other locations (for example, the Oracle IRM Desktop) until they expire or are manually checked in.
Example 5-18
import generated.DesktopServices;
import generated.DesktopServicesService;
import java.net.Authenticator;
import java.net.PasswordAuthentication;
import java.util.Map;
import javax.xml.ws.BindingProvider;
public class CheckIn {
public static void main(String[] args) {
final String endpointAddress = args[0];
final String username = args[1];
final String password = args[2];
// Configure an authenticator to provide the credentials
// for the web service
Authenticator.setDefault(new Authenticator() {
@Override
protected PasswordAuthentication getPasswordAuthentication() {
return new PasswordAuthentication(username, password.toCharArray());
}
});
// Get the desktop services web service
DesktopServicesService desktopServicesService = new DesktopServicesService();
DesktopServices desktopServices = desktopServicesService.getDesktopServices();
// Set the end point address
Map<String, Object> requestContext = ((BindingProvider)desktopServices).getRequestContext();
requestContext.put(BindingProvider.ENDPOINT_ADDRESS_PROPERTY, endpointAddress);
// The server URI. e.g. https://irm.example.com/irm_desktop
String serverURI = args[3];
// Check in all the licenses currently within the
// desktop store for the given server
desktopServices.checkIn(serverURI);
}
}
The following code demonstrates how to delete a domain. The sample code uses a fixed domain UUID for the new domain so that all sample code can work with a known domain. A new domain would typically be given a new random UUID value. The authenticated user must be a domain administrator. When a domain is deleted all the associated roles, templates and contexts are also deleted.
Example 5-19
import generated.DomainOperations;
import generated.DomainOperationsService;
import generated.DomainRef;
import java.net.Authenticator;
import java.net.PasswordAuthentication;
import java.util.Map;
import javax.xml.ws.BindingProvider;
public class DeleteDomain {
public static void main(String[] args) throws Exception {
final String endpointAddress = args[0];
final String username = args[1];
final String password = args[2];
// Configure an authenticator to provide the credentials
// for the web service
Authenticator.setDefault(new Authenticator() {
@Override
protected PasswordAuthentication getPasswordAuthentication() {
return new PasswordAuthentication(username, password.toCharArray());
}
});
// Get the domain operations web service
DomainOperationsService service = new DomainOperationsService();
DomainOperations domainOperations = service.getDomainOperations();
// Set the end point address
Map<String, Object> requestContext = ((BindingProvider)domainOperations).getRequestContext();
requestContext.put(BindingProvider.ENDPOINT_ADDRESS_PROPERTY, endpointAddress);
// Domain UUID is fixed for sample code
DomainRef domain = new DomainRef();
domain.setUuid("6fab93fd-2858-461a-a0b3-34e261dbf8fd");
// Delete the domain using the domain reference
domainOperations.deleteDomain(domain);
}
}