public void assertCredentialsNotExpired() { if ( subject().getAuthenticationResult().equals( AuthenticationResult.PASSWORD_CHANGE_REQUIRED ) ) { throw mode().onViolation( PERMISSION_DENIED ); } }
@Override public boolean credentialsExpired() { return loginContext.subject().getAuthenticationResult() == org.neo4j.internal.kernel.api.security.AuthenticationResult.PASSWORD_CHANGE_REQUIRED; } }
/** * Create a copy of this SecurityContext with the provided mode. */ public SecurityContext withMode( AccessMode mode ) { return new SecurityContext( subject, mode ); }
@Override public AuthorizationViolationException onViolation( String msg ) { return wrapping.onViolation( msg ); }
@Override public boolean allowsSchemaWrites() { return wrapping.allowsSchemaWrites(); }
@Override public SecurityContext withMode( AccessMode mode ) { return new AuthDisabled( mode ); }
@Override public String toString() { return defaultString( "auth-disabled" ); } }
@Override public boolean allowsReads() { return original.allowsReads() && wrapping.allowsReads(); }
@Override public boolean allowsWrites() { return original.allowsWrites() && wrapping.allowsWrites(); }
@Override public boolean allowsPropertyReads( int propertyKey ) { return original.allowsPropertyReads( propertyKey ) && wrapping.allowsPropertyReads( propertyKey ); }
@Override public boolean allowsTokenCreates() { return original.allowsTokenCreates() && wrapping.allowsTokenCreates(); }
@Override public SecurityContext authorize( ToIntFunction<String> propertyIdLookup, String dbName ) { return new SecurityContext( authSubject, accessMode ); } }
@Override public boolean allowsSchemaWrites() { return original.allowsSchemaWrites() && wrapping.allowsSchemaWrites(); }
@Override public SecurityContext authorize( ToIntFunction<String> propertyIdLookup, String dbName ) { return new SecurityContext( subject, AccessMode.Static.WRITE ); } };