@Override public boolean implies(ProtectionDomain pd, Permission p) { return perms.implies(p); }
public boolean implies(ProtectionDomain pd, Permission p) { return perms.implies(p); }
@Override public boolean implies(ProtectionDomain pd, Permission p) { return perms.implies(p); } @Override
public boolean implies(ProtectionDomain pd, Permission p) { return perms.implies(p); } public void refresh() {}
private boolean impliesUncheckedPermission(Permission permission, ElytronPolicyConfiguration policyConfiguration) { Permissions uncheckedPermissions = policyConfiguration.getUncheckedPermissions(); synchronized (uncheckedPermissions) { return uncheckedPermissions.implies(permission); } }
private boolean impliesExcludedPermission(Permission permission, ElytronPolicyConfiguration policyConfiguration) { Permissions excludedPermissions = policyConfiguration.getExcludedPermissions(); synchronized (excludedPermissions) { return excludedPermissions.implies(permission); } }
/** * The central point in checking permissions. * Overridden from java.lang.SecurityManager * * @param perm The permission requested. */ @Override public void checkPermission(final java.security.Permission perm) { if (active) { if (delegateToOldSM && !perm.getName().equals("exitVM")) { boolean permOK = false; if (granted.implies(perm)) { permOK = true; } checkRevoked(perm); /* if the permission was not explicitly granted or revoked the original security manager will do its work */ if (!permOK && origSm != null) { origSm.checkPermission(perm); } } else { if (!granted.implies(perm)) { throw new SecurityException("Permission " + perm + " was not granted."); } checkRevoked(perm); } } }
private boolean impliesRolePermission(ProtectionDomain domain, Permission permission, ElytronPolicyConfiguration policyConfiguration) throws PolicyContextException, ClassNotFoundException { Set<String> roles = new HashSet<>(); // keep JACC behavior where roles are obtained as Principal instances from a ProtectionDomain extractRolesFromProtectionDomain(domain, roles); // obtain additional roles from the current authenticated identity. // in this case the a RoleMapper will be used to map roles from the authenticated identity extractRolesFromCurrentIdentity(roles); roles.add(ANY_AUTHENTICATED_USER_ROLE); Map<String, Permissions> rolePermissions = policyConfiguration.getRolePermissions(); synchronized (rolePermissions) { for (String roleName : roles) { Permissions permissions = rolePermissions.get(roleName); if (permissions != null) { if (permissions.implies(permission)) { return true; } } } } return false; }
boolean implies(Permission p) { boolean rvalue = false; if (permissions != null) { rvalue = permissions.implies(p); } return rvalue; }
private boolean impliesUncheckedPermission(Permission permission, ElytronPolicyConfiguration policyConfiguration) { Permissions uncheckedPermissions = policyConfiguration.getUncheckedPermissions(); synchronized (uncheckedPermissions) { return uncheckedPermissions.implies(permission); } }
private boolean impliesExcludedPermission(Permission permission, ElytronPolicyConfiguration policyConfiguration) { Permissions excludedPermissions = policyConfiguration.getExcludedPermissions(); synchronized (excludedPermissions) { return excludedPermissions.implies(permission); } }
private boolean impliesUncheckedPermission(Permission permission, ElytronPolicyConfiguration policyConfiguration) { Permissions uncheckedPermissions = policyConfiguration.getUncheckedPermissions(); synchronized (uncheckedPermissions) { return uncheckedPermissions.implies(permission); } }
private boolean impliesExcludedPermission(Permission permission, ElytronPolicyConfiguration policyConfiguration) { Permissions excludedPermissions = policyConfiguration.getExcludedPermissions(); synchronized (excludedPermissions) { return excludedPermissions.implies(permission); } }
/** * */ @Override public boolean implies(final Permission permission) { if (unresolved != 0) { resolve(); } return pc.implies(permission); }
private boolean impliesUncheckedPermission(Permission permission, ElytronPolicyConfiguration policyConfiguration) { Permissions uncheckedPermissions = policyConfiguration.getUncheckedPermissions(); synchronized (uncheckedPermissions) { return uncheckedPermissions.implies(permission); } }
public boolean implies(Permission permission) { // first check implied permissions if ((impliedPermissions != null) && impliedPermissions.implies(permission)) return true; // Now check implied permissions added by weaving hooks. if (wovenPermissions.implies(permission)) return true; // We must be allowed by the restricted permissions to have any hope of passing the check if ((restrictedPermissions != null) && !restrictedPermissions.implies(permission)) return false; return securityAdmin.checkPermission(permission, this); }
public boolean implies(Permission permission) { // first check implied permissions if ((impliedPermissions != null) && impliedPermissions.implies(permission)) return true; // Now check implied permissions added by weaving hooks. if (wovenPermissions.implies(permission)) return true; // We must be allowed by the restricted permissions to have any hope of passing the check if ((restrictedPermissions != null) && !restrictedPermissions.implies(permission)) return false; return securityAdmin.checkPermission(permission, this); }
public boolean implies(Permission permission) { // first check implied permissions if ((impliedPermissions != null) && impliedPermissions.implies(permission)) return true; // Now check implied permissions added by weaving hooks. if (wovenPermissions.implies(permission)) return true; // We must be allowed by the restricted permissions to have any hope of passing the check if ((restrictedPermissions != null) && !restrictedPermissions.implies(permission)) return false; return securityAdmin.checkPermission(permission, this); }
public boolean implies(Permission permission) { // first check implied permissions if ((impliedPermissions != null) && impliedPermissions.implies(permission)) return true; // Now check implied permissions added by weaving hooks. if (wovenPermissions.implies(permission)) return true; // We must be allowed by the restricted permissions to have any hope of passing the check if ((restrictedPermissions != null) && !restrictedPermissions.implies(permission)) return false; return securityAdmin.checkPermission(permission, this); }