All Downloads are FREE. Search and download functionalities are using the official Maven repository.

atom.security.CompositePolicy Maven / Gradle / Ivy

/*
 * Copyright © 2013 Geeoz, and/or its affiliates. All rights reserved.
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
 *
 * The Research Projects is dual-licensed under the GNU General Public
 * License, version 2.0 (GPLv2) and the Geeoz Commercial License.
 *
 * Solely for non-commercial purposes. A purpose is non-commercial only if
 * it is in no manner primarily intended for or directed toward commercial
 * advantage or private monetary compensation.
 *
 * This Geeoz Software is supplied to you by Geeoz in consideration of your
 * agreement to the following terms, and your use, installation, modification
 * or redistribution of this Geeoz Software constitutes acceptance of these
 * terms. If you do not agree with these terms, please do not use, install,
 * modify or redistribute this Geeoz Software.
 *
 * Neither the name, trademarks, service marks or logos of Geeoz may be used
 * to endorse or promote products derived from the Geeoz Software without
 * specific prior written permission from Geeoz.
 *
 * The Geeoz Software is provided by Geeoz on an "AS IS" basis. GEEOZ MAKES NO
 * WARRANTIES, EXPRESS  OR IMPLIED, INCLUDING WITHOUT LIMITATION THE IMPLIED
 * WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY AND FITNESS FOR A PARTICULAR
 * PURPOSE, REGARDING THE GEEOZ SOFTWARE OR ITS USE AND OPERATION ALONE OR IN
 * COMBINATION WITH YOUR PRODUCTS.
 *
 * IN NO EVENT SHALL GEEOZ BE LIABLE FOR ANY SPECIAL, INDIRECT, INCIDENTAL
 * OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
 * INTERRUPTION) ARISING IN ANY WAY OUT OF THE USE, REPRODUCTION, MODIFICATION
 * AND/OR DISTRIBUTION OF THE GEEOZ SOFTWARE, HOWEVER CAUSED AND WHETHER UNDER
 * THEORY OF CONTRACT, TORT (INCLUDING NEGLIGENCE), STRICT LIABILITY OR
 * OTHERWISE, EVEN IF GEEOZ HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 *
 * A copy of the GNU General Public License is included in the distribution in
 * the file LICENSE and at
 *
 *     http://www.gnu.org/licenses/gpl-2.0.html
 *
 * If you are using the Research Projects for commercial purposes, we
 * encourage you to visit
 *
 *     http://products.geeoz.com/license
 *
 * for more details.
 *
 * This software or hardware and documentation may provide access to
 * or information on content, products, and services from third parties.
 * Geeoz and its affiliates are not responsible for and expressly disclaim
 * all warranties of any kind with respect to third-party content, products,
 * and services. Geeoz and its affiliates will not be responsible for any loss,
 * costs, or damages incurred due to your access to or use of third-party
 * content, products, or services. If a third-party content exists, the
 * additional copyright notices and license terms applicable to portions of the
 * software are set forth in the THIRD_PARTY_LICENSE_README file.
 *
 * Please contact Geeoz or visit www.geeoz.com if you need additional
 * information or have any questions.
 */

package atom.security;

import java.security.CodeSource;
import java.security.Permission;
import java.security.PermissionCollection;
import java.security.Permissions;
import java.security.Policy;
import java.security.ProtectionDomain;
import java.util.ArrayList;
import java.util.Collections;
import java.util.Enumeration;
import java.util.List;

/**
 * The purpose of CompositePolicy is to allow any number of Policy's to be in
 * effect at one time.
 *
 * @author Alex Voloshyn
 * @version 1.0 5/18/2013
 */
public final class CompositePolicy extends Policy {
    /**
     * Policy list.
     */
    private List policies = Collections.emptyList();

    /**
     * Default constructor.
     *
     * @param list list with policies
     */
    public CompositePolicy(final List list) {
        policies = new ArrayList<>(list);
    }

    @Override
    public PermissionCollection getPermissions(final ProtectionDomain domain) {
        final Permissions permissions = new Permissions();
        for (Policy policy : policies) {
            final PermissionCollection perms = policy.getPermissions(domain);
            final Enumeration elements = perms.elements();
            while (elements.hasMoreElements()) {
                final Permission permission = elements.nextElement();
                permissions.add(permission);
            }
        }
        return permissions;
    }

    @Override
    public boolean implies(final ProtectionDomain domain,
                           final Permission permission) {
        for (Policy policy : policies) {
            if (policy.implies(domain, permission)) {
                return true;
            }
        }

        return false;
    }

    @Override
    public PermissionCollection getPermissions(final CodeSource source) {
        final Permissions permissions = new Permissions();
        for (Policy policy : policies) {
            final PermissionCollection perms = policy.getPermissions(source);
            final Enumeration elements = perms.elements();
            while (elements.hasMoreElements()) {
                final Permission permission = elements.nextElement();
                permissions.add(permission);
            }
        }
        return permissions;
    }

    @Override
    public void refresh() {
        for (Policy policy : policies) {
            policy.refresh();
        }
    }
}




© 2015 - 2025 Weber Informatics LLC | Privacy Policy