String[] allowedGroups = this.authorizationConfiguration.getAllowedGroups(); String[] allowedRealms = this.authorizationConfiguration.getAllowedRealms(); String[] allowedRoles = this.authorizationConfiguration.getAllowedRoles(); String[] expressions = this.authorizationConfiguration.getExpressions(); List<Class<? extends PathAuthorizer>> authorizers = this.authorizationConfiguration.getAuthorizers(); allowedGroups = groupAuthz.getAllowedGroups(); allowedRealms = groupAuthz.getAllowedRealms(); allowedRoles = groupAuthz.getAllowedRoles(); expressions = groupAuthz.getExpressions(); authorizers = groupAuthz.getAuthorizers(); return new AuthorizationConfiguration(this, allowedRoles, allowedGroups, allowedRealms, expressions, authorizers); } else if (groupAuthz != null) {
@Override protected boolean doAuthorize(PathConfiguration pathConfiguration, HttpServletRequest request, HttpServletResponse response) { AuthorizationConfiguration authorizationConfiguration = pathConfiguration.getAuthorizationConfiguration(); String[] allowedGroups = authorizationConfiguration.getAllowedGroups(); if (allowedGroups != null) { Identity identity = getIdentity(); for (String groupName : allowedGroups) { if (!AuthorizationUtil.isMember(identity, this.partitionManager, groupName)) { return false; } } } return true; }
@Override protected boolean doAuthorize(PathConfiguration pathConfiguration, HttpServletRequest request, HttpServletResponse response) { AuthorizationConfiguration authorizationConfiguration = pathConfiguration.getAuthorizationConfiguration(); String[] allowedRoles = authorizationConfiguration.getAllowedRoles(); if (allowedRoles != null) { Identity identity = getIdentity(); for (String roneName : allowedRoles) { if (!hasRole(identity, this.partitionManager, roneName)) { return false; } } } return true; }
@Override public boolean doAuthorize(PathConfiguration pathConfiguration, HttpServletRequest request, HttpServletResponse response) { AuthorizationConfiguration authorizationConfiguration = pathConfiguration.getAuthorizationConfiguration(); String[] allowedRealms = authorizationConfiguration.getAllowedRealms(); if (allowedRealms == null) { return true; } Identity identity = getIdentity(); for (String realmName : allowedRealms) { if (hasPartition(identity, Partition.class, realmName)) { return true; } try { Class<Object> partitionType = Reflections.classForName(realmName); if (hasPartition(identity, partitionType, null)) { return true; } } catch (Exception ignore) { } } return false; } }
private void initializePathAuthorizers() { for (List<PathConfiguration> configurations : this.configuration.getPaths().values()) { for (PathConfiguration pathConfiguration : configurations) { if (pathConfiguration.isSecured()) { AuthorizationConfiguration authorizationConfiguration = pathConfiguration.getAuthorizationConfiguration(); if (authorizationConfiguration != null) { List<PathAuthorizer> pathAuthorizers = new ArrayList<PathAuthorizer>(); List<Class<? extends PathAuthorizer>> pathAuthorizerTypes = new ArrayList<Class<? extends PathAuthorizer>>( authorizationConfiguration.getAuthorizers()); pathAuthorizerTypes.addAll(getDefaultPathAuthorizers()); for (Class<? extends PathAuthorizer> authorizerType : pathAuthorizerTypes) { try { pathAuthorizers.add(resolveInstance(this.pathAuthorizerInstance, authorizerType)); } catch (Exception e) { throw new HttpSecurityConfigurationException("Could not resolve PathAuthorizer [" + authorizerType + "].", e); } } this.pathAuthorizers.put(pathConfiguration, pathAuthorizers); } } } } }
AuthorizationConfiguration authorizationConfiguration = pathConfiguration.getAuthorizationConfiguration(); if (authorizationConfiguration.getExpressions() == null) { return true; String[] expressions = authorizationConfiguration.getExpressions(); String[] expressions = authorizationConfiguration.getExpressions(); String formattedProtectedUri = protectedUri;
AuthorizationConfiguration create(PathConfiguration pathConfiguration) { return new AuthorizationConfiguration(pathConfiguration, this.rolesAllowed, this.groupsAllowed, this.realmsAllowed, this.elExpresion, this.authorizers); } }
@Override protected boolean doAuthorize(PathConfiguration pathConfiguration, HttpServletRequest request, HttpServletResponse response) { AuthorizationConfiguration authorizationConfiguration = pathConfiguration.getAuthorizationConfiguration(); String[] allowedGroups = authorizationConfiguration.getAllowedGroups(); if (allowedGroups != null) { Identity identity = getIdentity(); for (String groupName : allowedGroups) { if (!AuthorizationUtil.isMember(identity, this.partitionManager, groupName)) { return false; } } } return true; }
@Override protected boolean doAuthorize(PathConfiguration pathConfiguration, HttpServletRequest request, HttpServletResponse response) { AuthorizationConfiguration authorizationConfiguration = pathConfiguration.getAuthorizationConfiguration(); String[] allowedRoles = authorizationConfiguration.getAllowedRoles(); if (allowedRoles != null) { Identity identity = getIdentity(); for (String roneName : allowedRoles) { if (!hasRole(identity, this.partitionManager, roneName)) { return false; } } } return true; }
@Override public boolean doAuthorize(PathConfiguration pathConfiguration, HttpServletRequest request, HttpServletResponse response) { AuthorizationConfiguration authorizationConfiguration = pathConfiguration.getAuthorizationConfiguration(); String[] allowedRealms = authorizationConfiguration.getAllowedRealms(); if (allowedRealms == null) { return true; } Identity identity = getIdentity(); for (String realmName : allowedRealms) { if (hasPartition(identity, Partition.class, realmName)) { return true; } try { Class<Object> partitionType = Reflections.classForName(realmName); if (hasPartition(identity, partitionType, null)) { return true; } } catch (Exception ignore) { } } return false; } }
private void initializePathAuthorizers() { for (List<PathConfiguration> configurations : this.configuration.getPaths().values()) { for (PathConfiguration pathConfiguration : configurations) { if (pathConfiguration.isSecured()) { AuthorizationConfiguration authorizationConfiguration = pathConfiguration.getAuthorizationConfiguration(); if (authorizationConfiguration != null) { List<PathAuthorizer> pathAuthorizers = new ArrayList<PathAuthorizer>(); List<Class<? extends PathAuthorizer>> pathAuthorizerTypes = new ArrayList<Class<? extends PathAuthorizer>>( authorizationConfiguration.getAuthorizers()); pathAuthorizerTypes.addAll(getDefaultPathAuthorizers()); for (Class<? extends PathAuthorizer> authorizerType : pathAuthorizerTypes) { try { pathAuthorizers.add(resolveInstance(this.pathAuthorizerInstance, authorizerType)); } catch (Exception e) { throw new HttpSecurityConfigurationException("Could not resolve PathAuthorizer [" + authorizerType + "].", e); } } this.pathAuthorizers.put(pathConfiguration, pathAuthorizers); } } } } }
AuthorizationConfiguration authorizationConfiguration = pathConfiguration.getAuthorizationConfiguration(); if (authorizationConfiguration.getExpressions() == null) { return true; String[] expressions = authorizationConfiguration.getExpressions(); String[] expressions = authorizationConfiguration.getExpressions(); String formattedProtectedUri = protectedUri;
AuthorizationConfiguration create(PathConfiguration pathConfiguration) { return new AuthorizationConfiguration(pathConfiguration, this.rolesAllowed, this.groupsAllowed, this.realmsAllowed, this.elExpresion, this.authorizers); } }
String[] allowedGroups = this.authorizationConfiguration.getAllowedGroups(); String[] allowedRealms = this.authorizationConfiguration.getAllowedRealms(); String[] allowedRoles = this.authorizationConfiguration.getAllowedRoles(); String[] expressions = this.authorizationConfiguration.getExpressions(); List<Class<? extends PathAuthorizer>> authorizers = this.authorizationConfiguration.getAuthorizers(); allowedGroups = groupAuthz.getAllowedGroups(); allowedRealms = groupAuthz.getAllowedRealms(); allowedRoles = groupAuthz.getAllowedRoles(); expressions = groupAuthz.getExpressions(); authorizers = groupAuthz.getAuthorizers(); return new AuthorizationConfiguration(this, allowedRoles, allowedGroups, allowedRealms, expressions, authorizers); } else if (groupAuthz != null) {
@Override protected boolean doAuthorize(PathConfiguration pathConfiguration, HttpServletRequest request, HttpServletResponse response) { AuthorizationConfiguration authorizationConfiguration = pathConfiguration.getAuthorizationConfiguration(); String[] allowedGroups = authorizationConfiguration.getAllowedGroups(); if (allowedGroups != null) { Identity identity = getIdentity(); for (String groupName : allowedGroups) { if (!AuthorizationUtil.isMember(identity, this.partitionManager, groupName)) { return false; } } } return true; }
@Override protected boolean doAuthorize(PathConfiguration pathConfiguration, HttpServletRequest request, HttpServletResponse response) { AuthorizationConfiguration authorizationConfiguration = pathConfiguration.getAuthorizationConfiguration(); String[] allowedRoles = authorizationConfiguration.getAllowedRoles(); if (allowedRoles != null) { Identity identity = getIdentity(); for (String roneName : allowedRoles) { if (!hasRole(identity, this.partitionManager, roneName)) { return false; } } } return true; }
@Override public boolean doAuthorize(PathConfiguration pathConfiguration, HttpServletRequest request, HttpServletResponse response) { AuthorizationConfiguration authorizationConfiguration = pathConfiguration.getAuthorizationConfiguration(); String[] allowedRealms = authorizationConfiguration.getAllowedRealms(); if (allowedRealms == null) { return true; } Identity identity = getIdentity(); for (String realmName : allowedRealms) { if (hasPartition(identity, Partition.class, realmName)) { return true; } try { Class<Object> partitionType = Reflections.classForName(realmName); if (hasPartition(identity, partitionType, null)) { return true; } } catch (Exception ignore) { } } return false; } }
private void initializePathAuthorizers() { for (List<PathConfiguration> configurations : this.configuration.getPaths().values()) { for (PathConfiguration pathConfiguration : configurations) { if (pathConfiguration.isSecured()) { AuthorizationConfiguration authorizationConfiguration = pathConfiguration.getAuthorizationConfiguration(); if (authorizationConfiguration != null) { List<PathAuthorizer> pathAuthorizers = new ArrayList<PathAuthorizer>(); List<Class<? extends PathAuthorizer>> pathAuthorizerTypes = new ArrayList<Class<? extends PathAuthorizer>>( authorizationConfiguration.getAuthorizers()); pathAuthorizerTypes.addAll(getDefaultPathAuthorizers()); for (Class<? extends PathAuthorizer> authorizerType : pathAuthorizerTypes) { try { pathAuthorizers.add(resolveInstance(this.pathAuthorizerInstance, authorizerType)); } catch (Exception e) { throw new HttpSecurityConfigurationException("Could not resolve PathAuthorizer [" + authorizerType + "].", e); } } this.pathAuthorizers.put(pathConfiguration, pathAuthorizers); } } } } }
AuthorizationConfiguration authorizationConfiguration = pathConfiguration.getAuthorizationConfiguration(); if (authorizationConfiguration.getExpressions() == null) { return true; String[] expressions = authorizationConfiguration.getExpressions(); String[] expressions = authorizationConfiguration.getExpressions(); String formattedProtectedUri = protectedUri;
AuthorizationConfiguration create(PathConfiguration pathConfiguration) { return new AuthorizationConfiguration(pathConfiguration, this.rolesAllowed, this.groupsAllowed, this.realmsAllowed, this.elExpresion, this.authorizers); } }