Examples of PermissionCollection


Examples of java.security.PermissionCollection

        // Break if permission is null
        if (permission == null) {
            return;
        }
        PermissionCollection permissionsOfRole = rolePermissions.get(roleName);

        // create permission object if no previous permission for the given role
        if (permissionsOfRole == null) {
            permissionsOfRole = new Permissions();
        }
        permissionsOfRole.add(permission);

        // add to the list
        rolePermissions.put(roleName, permissionsOfRole);

    }
View Full Code Here

Examples of java.security.PermissionCollection

        // Break if permission is null
        if (permissions == null) {
            return;
        }
        PermissionCollection permissionsOfRole = rolePermissions.get(roleName);

        // create permission object if no previous permission for the given role
        if (permissionsOfRole == null) {
            permissionsOfRole = new Permissions();
        }

        for (Enumeration e = permissions.elements(); e.hasMoreElements();) {
            permissionsOfRole.add((Permission) e.nextElement());
        }

        // add to the list
        rolePermissions.put(roleName, permissionsOfRole);
View Full Code Here

Examples of java.security.PermissionCollection

        // Works only if state is in service and if principal is not null
        if (principal == null || state != State.IN_SERVICE) {
            return new Permissions();
        }

        PermissionCollection permissionsOfRole = rolePermissions.get(principal.getName());

        logger.debug("Permissions found = ''{0}''", permissionsOfRole);

        // create empty permission object if no previous permission for the
        // given role
View Full Code Here

Examples of java.security.PermissionCollection

         * JACC 3.2 The provider must ensure that excluded policy statements
         * take precedence over overlapping unchecked policy statements, and
         * that both excluded and unchecked policy statements take precedence
         * over overlapping role based policy statements.
         */
        PermissionCollection excludedPermissions = jPolicyConfiguration.getExcludedPermissions();
        PermissionCollection uncheckedPermissions = jPolicyConfiguration.getUncheckedPermissions();

        // debug info.
        if (logger.isDebugEnabled()) {
            logger.debug("Check permission");
            logger.debug("Excluded permissions = " + excludedPermissions);
            logger.debug("unchecked permissions = " + uncheckedPermissions);
        }

        // excluded ?
        if (excludedPermissions.implies(permission)) {
            logger.debug("Permission ''{0}'' is excluded, return false", permission);
            return false;
        } else if (uncheckedPermissions.implies(permission)) { // unchecked
            logger.debug("Permission ''{0}'' is unchecked, return true", permission);
            return true;
        } else {
            // per role if any or false
            if (domain.getPrincipals().length > 0) {
View Full Code Here

Examples of java.security.PermissionCollection

    private boolean isImpliedPermissionForPrincipals(final JPolicyConfiguration jPolicyConfiguration,
            final Permission permission, final Principal[] principals) {
        // if (logger.isLoggable(BasicLevel.DEBUG)) {
        // logger.log(BasicLevel.DEBUG, "");
        // }
        PermissionCollection permissions = null;
        int i = 0;
        boolean implied = false;
        // for each principal's permissions check if the given permission is
        // implied
        while (i < principals.length && !implied) {
            if (logger.isDebugEnabled()) {
                logger.debug("Checking permission ''{0}'' with permissions of Principal ''{1}''.", permission, principals[i]
                        .getName());
            }
            permissions = jPolicyConfiguration.getPermissionsForPrincipal(principals[i]);

            if (permissions.implies(permission)) {
                if (logger.isDebugEnabled()) {
                    logger.debug("Permission implied with principal ''{0}''.", principals[i].getName());
                }
                implied = true;
            }
View Full Code Here

Examples of java.security.PermissionCollection

        if (domain != null) {
            domainKey = "";
            csKey = domain.getCodeSource();

            PermissionCollection pc = domain.getPermissions();
            if (pc != null) {
                List<Permission> permList = Collections.list(pc.elements());
                if (permList.size() == 1) {
                    permsKey = permList.get(0);
                } else if (permList.size() > 1) {
                    permsKey = new HashSet<Permission>(permList);
                }
View Full Code Here

Examples of java.security.PermissionCollection

            {
                return super.getPermissions(cs);
            }

            Permissions combi = new Permissions();
            PermissionCollection permCollect = super.getPermissions(cs);
            copyPermissions(permCollect, combi);

            for (FileObject parent = parentLayer;
                 parent != null;
                 parent = parent.getFileSystem().getParentLayer())
View Full Code Here

Examples of java.security.PermissionCollection

  }
 
 
  public final boolean checkPermission(Permission perm)
  {
    PermissionCollection perms = getCombinedPermissions();
    if (perms != null) {
      if (perms.implies(perm)) {
        return true;
      }
    }
    return false;
  }
View Full Code Here

Examples of java.security.PermissionCollection

      log.debug(perm.toString());
    }
 
    Citizen citizen = _citizen;
    if (citizen != null) {
      PermissionCollection pc = citizen.getCombinedPermissions();
      if (pc != null) {
        if (pc.implies(perm)) {
          return true;
        }
      }
    }
   
View Full Code Here

Examples of java.security.PermissionCollection

  /// @synopsis enumeration getPermissions()
  /// @throws AccessDenied If security policy denies this operation
  public Any m_getPermissions(Context context)
  {
    context.checkAccess(AnyRealm.CAN_READ);
    PermissionCollection pers = _tribe.getPermissions();
    Enumeration enu = pers.elements();
    ArrayList list = new ArrayList();
    while (enu.hasMoreElements()) {
      list.add( new AnyPermission((Permission)enu.nextElement()) );
    }
    return new AnyTuple( (Any[])list.toArray(new Any[list.size()]) );
View Full Code Here
TOP
Copyright © 2018 www.massapi.com. All rights reserved.
All source code are property of their respective owners. Java is a trademark of Sun Microsystems, Inc and owned by ORACLE Inc. Contact coftware#gmail.com.