All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.apache.shiro.mgt.AuthorizingSecurityManager Maven / Gradle / Ivy

There is a newer version: 3.9
Show newest version
/*
 * Licensed to the Apache Software Foundation (ASF) under one
 * or more contributor license agreements.  See the NOTICE file
 * distributed with this work for additional information
 * regarding copyright ownership.  The ASF licenses this file
 * to you under the Apache License, Version 2.0 (the
 * "License"); you may not use this file except in compliance
 * with the License.  You may obtain a copy of the License at
 *
 *     http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing,
 * software distributed under the License is distributed on an
 * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
 * KIND, either express or implied.  See the License for the
 * specific language governing permissions and limitations
 * under the License.
 */
package org.apache.shiro.mgt;

import org.apache.shiro.authz.AuthorizationException;
import org.apache.shiro.authz.Authorizer;
import org.apache.shiro.authz.ModularRealmAuthorizer;
import org.apache.shiro.authz.Permission;
import org.apache.shiro.subject.PrincipalCollection;
import org.apache.shiro.util.LifecycleUtils;

import java.util.Collection;
import java.util.List;


/**
 * Shiro support of a {@link SecurityManager} class hierarchy that delegates all
 * authorization (access control) operations to a wrapped {@link Authorizer Authorizer} instance.  That is,
 * this class implements all the Authorizer methods in the {@link SecurityManager SecurityManager}
 * interface, but in reality, those methods are merely passthrough calls to the underlying 'real'
 * Authorizer instance.
 *
 * 

All remaining SecurityManager methods not covered by this class or its parents (mostly Session support) * are left to be implemented by subclasses. * *

In keeping with the other classes in this hierarchy and Shiro's desire to minimize configuration whenever * possible, suitable default instances for all dependencies will be created upon instantiation. * * @since 0.9 */ public abstract class AuthorizingSecurityManager extends AuthenticatingSecurityManager { /** * The wrapped instance to which all of this SecurityManager authorization calls are delegated. */ private Authorizer authorizer; /** * Default no-arg constructor that initializes an internal default * {@link org.apache.shiro.authz.ModularRealmAuthorizer ModularRealmAuthorizer}. */ public AuthorizingSecurityManager() { super(); this.authorizer = new ModularRealmAuthorizer(); } /** * Returns the underlying wrapped Authorizer instance to which this SecurityManager * implementation delegates all of its authorization calls. * * @return the wrapped Authorizer used by this SecurityManager implementation. */ public Authorizer getAuthorizer() { return authorizer; } /** * Sets the underlying Authorizer instance to which this SecurityManager implementation will * delegate all of its authorization calls. * * @param authorizer the Authorizer this SecurityManager should wrap and delegate all of its * authorization calls to. */ public void setAuthorizer(Authorizer authorizer) { if (authorizer == null) { String msg = "Authorizer argument cannot be null."; throw new IllegalArgumentException(msg); } this.authorizer = authorizer; } /** * First calls super.afterRealmsSet() and then sets these same Realm objects on this * instance's wrapped {@link Authorizer Authorizer}. *

* The setting of realms the Authorizer will only occur if it is an instance of * {@link org.apache.shiro.authz.ModularRealmAuthorizer ModularRealmAuthorizer}, that is: *

     * if ( this.authorizer instanceof ModularRealmAuthorizer ) {
     *     ((ModularRealmAuthorizer)this.authorizer).setRealms(realms);
     * }
*/ protected void afterRealmsSet() { super.afterRealmsSet(); if (this.authorizer instanceof ModularRealmAuthorizer) { ((ModularRealmAuthorizer) this.authorizer).setRealms(getRealms()); } } public void destroy() { LifecycleUtils.destroy(getAuthorizer()); this.authorizer = null; super.destroy(); } public boolean isPermitted(PrincipalCollection principals, String permissionString) { return this.authorizer.isPermitted(principals, permissionString); } public boolean isPermitted(PrincipalCollection principals, Permission permission) { return this.authorizer.isPermitted(principals, permission); } public boolean[] isPermitted(PrincipalCollection principals, String... permissions) { return this.authorizer.isPermitted(principals, permissions); } public boolean[] isPermitted(PrincipalCollection principals, List permissions) { return this.authorizer.isPermitted(principals, permissions); } public boolean isPermittedAll(PrincipalCollection principals, String... permissions) { return this.authorizer.isPermittedAll(principals, permissions); } public boolean isPermittedAll(PrincipalCollection principals, Collection permissions) { return this.authorizer.isPermittedAll(principals, permissions); } public void checkPermission(PrincipalCollection principals, String permission) throws AuthorizationException { this.authorizer.checkPermission(principals, permission); } public void checkPermission(PrincipalCollection principals, Permission permission) throws AuthorizationException { this.authorizer.checkPermission(principals, permission); } public void checkPermissions(PrincipalCollection principals, String... permissions) throws AuthorizationException { this.authorizer.checkPermissions(principals, permissions); } public void checkPermissions(PrincipalCollection principals, Collection permissions) throws AuthorizationException { this.authorizer.checkPermissions(principals, permissions); } public boolean hasRole(PrincipalCollection principals, String roleIdentifier) { return this.authorizer.hasRole(principals, roleIdentifier); } public boolean[] hasRoles(PrincipalCollection principals, List roleIdentifiers) { return this.authorizer.hasRoles(principals, roleIdentifiers); } public boolean hasAllRoles(PrincipalCollection principals, Collection roleIdentifiers) { return this.authorizer.hasAllRoles(principals, roleIdentifiers); } public void checkRole(PrincipalCollection principals, String role) throws AuthorizationException { this.authorizer.checkRole(principals, role); } public void checkRoles(PrincipalCollection principals, Collection roles) throws AuthorizationException { this.authorizer.checkRoles(principals, roles); } public void checkRoles(PrincipalCollection principals, String... roles) throws AuthorizationException { this.authorizer.checkRoles(principals, roles); } }




© 2015 - 2025 Weber Informatics LLC | Privacy Policy