return new ArrayList<Role>(); } else { Role[] allowedRoles = secured.value(); return Arrays.asList(allowedRoles);
/** * Creates an instance of {@link SecurityViolation} for a given * string which will be used as reason to describe the violation. * * @param reason description of the violation * @return A new instance of {@link SecurityViolation} * which provides details about the found restriction. */ protected SecurityViolation newSecurityViolation(String reason) { return new SimpleSecurityViolation(reason); } }
@Override public Secured beforeAddToConfig(Secured metaData, ViewConfigNode viewConfigNode) { viewConfigNode.registerCallbackDescriptors(Secured.class, new Descriptor(metaData.value())); return metaData; //no change needed } }
private void processAccessDeniedException(Throwable throwable) { if (throwable instanceof ErrorViewAwareAccessDeniedException) { SecurityUtils.handleSecurityViolationWithoutNavigation((AccessDeniedException) throwable); } else { ErrorViewAwareAccessDeniedException securityException = new ErrorViewAwareAccessDeniedException( ((AccessDeniedException)throwable).getViolations(), DefaultErrorView.class); SecurityUtils.handleSecurityViolationWithoutNavigation(securityException); } } }
/** * It should be final - but proxy-libs won't support it. */ @Override public Set<SecurityViolation> checkPermission(AccessDecisionVoterContext accessDecisionVoterContext) { Set<SecurityViolation> result = new HashSet<SecurityViolation>(); checkPermission(accessDecisionVoterContext, result); return result; }
/** * {@inheritDoc} */ @Override public void addViolation(SecurityViolation securityViolation) { if (securityViolations == null) { throw new IllegalStateException( AccessDecisionState.VOTE_IN_PROGRESS.name() + " is required for adding security-violations"); } securityViolations.add(securityViolation); } }
@Secures @RequiresPermission public boolean hasPermission(InvocationContext invocationContext) { RequiresPermission requiresPermission = getAnnotation(invocationContext, RequiresPermission.class); String resource = requiresPermission.resource(); Class<?> resourceClass = requiresPermission.resourceClass(); String resourceIdentifier = requiresPermission.resourceIdentifier(); String operation = requiresPermission.operation(); return AuthorizationUtil.hasPermission(getIdentity(), resource, resourceClass, resourceIdentifier, operation); }
public String getViolationInfo(AccessDecisionVoterContext accessContext, SecurityViolation securityViolation) { AuthorizationViolation violation = defineCustomViolation(accessContext, securityViolation); if (violation == null) { InvocationContext context = accessContext.getSource(); violation = new BasicAuthorizationViolation(securityViolation.getReason(), getExceptionPointInfo(context)); } return violation.toString(); }
public String getViolationInfo(AccessDecisionVoterContext accessContext) { InvocationContext context = accessContext.getSource(); return getExceptionPointInfo(context); }
@Override public Secured beforeAddToConfig(Secured metaData, ViewConfigNode viewConfigNode) { viewConfigNode.registerCallbackDescriptors(Secured.class, new Descriptor(metaData.value())); return metaData; //no change needed } }
private void processAccessDeniedException(Throwable throwable) { if (throwable instanceof ErrorViewAwareAccessDeniedException) { SecurityUtils.handleSecurityViolationWithoutNavigation((AccessDeniedException) throwable); } else { ErrorViewAwareAccessDeniedException securityException = new ErrorViewAwareAccessDeniedException( ((AccessDeniedException)throwable).getViolations(), DefaultErrorView.class); SecurityUtils.handleSecurityViolationWithoutNavigation(securityException); } } }
/** * It should be final - but proxy-libs won't support it. */ @Override public Set<SecurityViolation> checkPermission(AccessDecisionVoterContext accessDecisionVoterContext) { Set<SecurityViolation> result = new HashSet<SecurityViolation>(); checkPermission(accessDecisionVoterContext, result); return result; }
/** * {@inheritDoc} */ @Override public void addViolation(SecurityViolation securityViolation) { if (securityViolations == null) { throw new IllegalStateException( AccessDecisionState.VOTE_IN_PROGRESS.name() + " is required for adding security-violations"); } securityViolations.add(securityViolation); } }
@Secures @RequiresPermission public boolean hasPermission(InvocationContext invocationContext) { RequiresPermission requiresPermission = getAnnotation(invocationContext, RequiresPermission.class); String resource = requiresPermission.resource(); Class<?> resourceClass = requiresPermission.resourceClass(); String resourceIdentifier = requiresPermission.resourceIdentifier(); String operation = requiresPermission.operation(); return AuthorizationUtil.hasPermission(getIdentity(), resource, resourceClass, resourceIdentifier, operation); }
/** * Creates an instance of {@link SecurityViolation} for a given * string which will be used as reason to describe the violation. * * @param reason description of the violation * @return A new instance of {@link SecurityViolation} * which provides details about the found restriction. */ protected SecurityViolation newSecurityViolation(String reason) { return new SimpleSecurityViolation(reason); } }
public String getViolationInfo(AccessDecisionVoterContext accessDecisionVoterContext, Permission violatedPermission) { AuthorizationViolation violation = defineCustomViolation(accessDecisionVoterContext, violatedPermission); if (violation == null) { InvocationContext invocationContext = accessDecisionVoterContext.getSource(); violation = defineOctopusViolation(invocationContext, violatedPermission); } return violation.toString(); }
@Override public Secured beforeAddToConfig(Secured metaData, ViewConfigNode viewConfigNode) { viewConfigNode.registerCallbackDescriptors(Secured.class, new Descriptor(metaData.value())); return metaData; //no change needed } }
/** * It should be final - but proxy-libs won't support it. */ @Override public Set<SecurityViolation> checkPermission(AccessDecisionVoterContext accessDecisionVoterContext) { Set<SecurityViolation> result = new HashSet<SecurityViolation>(); checkPermission(accessDecisionVoterContext, result); return result; }
/** * {@inheritDoc} */ @Override public void addViolation(SecurityViolation securityViolation) { if (securityViolations == null) { throw new IllegalStateException( AccessDecisionState.VOTE_IN_PROGRESS.name() + " is required for adding security-violations"); } securityViolations.add(securityViolation); } }
/** * Creates an instance of {@link SecurityViolation} for a given * string which will be used as reason to describe the violation. * * @param reason description of the violation * @return A new instance of {@link SecurityViolation} * which provides details about the found restriction. */ protected SecurityViolation newSecurityViolation(String reason) { return new SimpleSecurityViolation(reason); } }