All Downloads are FREE. Search and download functionalities are using the official Maven repository.

org.springframework.security.acls.afterinvocation.AclEntryAfterInvocationCollectionFilteringProvider Maven / Gradle / Ivy

/*
 * Copyright 2004, 2005, 2006 Acegi Technology Pty Limited
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *      http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
package org.springframework.security.acls.afterinvocation;

import java.util.Collection;
import java.util.List;

import org.apache.commons.logging.Log;
import org.apache.commons.logging.LogFactory;
import org.springframework.security.access.AccessDeniedException;
import org.springframework.security.access.AuthorizationServiceException;
import org.springframework.security.access.ConfigAttribute;
import org.springframework.security.acls.model.AclService;
import org.springframework.security.acls.model.Permission;
import org.springframework.security.core.Authentication;

/**
 * 

* Given a Collection of domain object instances returned from a secure * object invocation, remove any Collection elements the principal does not * have appropriate permission to access as defined by the {@link AclService}. *

* The AclService is used to retrieve the access control list (ACL) * permissions associated with each Collection domain object instance element * for the current Authentication object. *

* This after invocation provider will fire if any {@link ConfigAttribute#getAttribute()} * matches the {@link #processConfigAttribute}. The provider will then lookup the ACLs * from the AclService and ensure the principal is * {@link org.springframework.security.acls.model.Acl#isGranted(List, List, boolean) * Acl.isGranted()} when presenting the {@link #requirePermission} array to that method. *

* If the principal does not have permission, that element will not be included in the * returned Collection. *

* Often users will setup a BasicAclEntryAfterInvocationProvider with a * {@link #processConfigAttribute} of AFTER_ACL_COLLECTION_READ and a * {@link #requirePermission} of BasePermission.READ. These are also the * defaults. *

* If the provided returnObject is null, a null * Collection will be returned. If the provided returnObject is * not a Collection, an {@link AuthorizationServiceException} will be thrown. *

* All comparisons and prefixes are case sensitive. * * @author Ben Alex * @author Paulo Neves */ public class AclEntryAfterInvocationCollectionFilteringProvider extends AbstractAclProvider { // ~ Static fields/initializers // ===================================================================================== protected static final Log logger = LogFactory .getLog(AclEntryAfterInvocationCollectionFilteringProvider.class); // ~ Constructors // =================================================================================================== public AclEntryAfterInvocationCollectionFilteringProvider(AclService aclService, List requirePermission) { super(aclService, "AFTER_ACL_COLLECTION_READ", requirePermission); } // ~ Methods // ======================================================================================================== @SuppressWarnings("unchecked") public Object decide(Authentication authentication, Object object, Collection config, Object returnedObject) throws AccessDeniedException { if (returnedObject == null) { logger.debug("Return object is null, skipping"); return null; } for (ConfigAttribute attr : config) { if (!this.supports(attr)) { continue; } // Need to process the Collection for this invocation Filterer filterer; if (returnedObject instanceof Collection) { filterer = new CollectionFilterer((Collection) returnedObject); } else if (returnedObject.getClass().isArray()) { filterer = new ArrayFilterer((Object[]) returnedObject); } else { throw new AuthorizationServiceException( "A Collection or an array (or null) was required as the " + "returnedObject, but the returnedObject was: " + returnedObject); } // Locate unauthorised Collection elements for (Object domainObject : filterer) { // Ignore nulls or entries which aren't instances of the configured domain // object class if (domainObject == null || !getProcessDomainObjectClass().isAssignableFrom( domainObject.getClass())) { continue; } if (!hasPermission(authentication, domainObject)) { filterer.remove(domainObject); if (logger.isDebugEnabled()) { logger.debug("Principal is NOT authorised for element: " + domainObject); } } } return filterer.getFilteredObject(); } return returnedObject; } }





© 2015 - 2024 Weber Informatics LLC | Privacy Policy