Examples of PermissionEntry


Examples of com.sun.enterprise.security.provider.PolicyParser.PermissionEntry

      Enumeration pEnum = uncheckedPermissions.elements();
      if (pEnum.hasMoreElements()) {
    GrantEntry grant = new GrantEntry();
    while (pEnum.hasMoreElements()) {
        Permission p = (Permission) pEnum.nextElement();
        PermissionEntry entry =
      new PermissionEntry(p.getClass().getName(),
              p.getName(),p.getActions());
        grant.add(entry);
    }
    parser.add(grant);
      }
  }

  // load role based grants in parser
  if (rolePermissionsTable != null) {
      Iterator roleIt = rolePermissionsTable.keySet().iterator();
      while (roleIt.hasNext()) {
    boolean withPrincipals = false;
    String roleName = (String) roleIt.next();
    Permissions rolePerms = getRolePermissions(roleName);
    Subject rolePrincipals = (Subject) roleToSubjectMap.get(roleName);
    if (rolePrincipals != null) {
        Iterator pit = rolePrincipals.getPrincipals().iterator();
        while (pit.hasNext()){
      Principal prin = (Principal) pit.next();

      if (prin != null) {
          withPrincipals = true;
          PrincipalEntry prinEntry =
        new PrincipalEntry(prin.getClass().getName(),
               escapeName(prin.getName()));
          GrantEntry grant = new GrantEntry();
          grant.principals.add(prinEntry);
          Enumeration pEnum = rolePerms.elements();
          while (pEnum.hasMoreElements()) {
        Permission perm = (Permission) pEnum.nextElement();
        PermissionEntry permEntry =
            new PermissionEntry(perm.getClass().getName(),
              perm.getName(),
              perm.getActions());
        grant.add(permEntry);
          }
          parser.add(grant);
      }
      else {
                            String msg = localStrings.getLocalString("pc.non_principal_mapped_to_role",
                                         "non principal mapped to role "+roleName,new Object[]{prin,roleName});
          logger.log(Level.WARNING,msg);
      }
        }
    }
    /**
     * JACC MR8 add grant for the any authenticated user role '**'
     */
    if (!withPrincipals && ("**".equals(roleName))) {
      withPrincipals = true;
      PrincipalEntry prinEntry = new PrincipalEntry(
          PrincipalEntry.WILDCARD_CLASS,PrincipalEntry.WILDCARD_NAME);
      GrantEntry grant = new GrantEntry();
      grant.principals.add(prinEntry);
      Enumeration pEnum = rolePerms.elements();
      while (pEnum.hasMoreElements()) {
        Permission perm = (Permission) pEnum.nextElement();
        PermissionEntry permEntry =
            new PermissionEntry(perm.getClass().getName(),
                perm.getName(),
                perm.getActions());
        grant.add(permEntry);
      }
      parser.add(grant);
      if(logger.isLoggable (Level.FINE)){
        logger.fine("JACC Policy Provider: added role grant for any authenticated user");
      }
    }
    if (!withPrincipals) {
                    String msg = localStrings.getLocalString("pc.no_principals_mapped_to_role",
                                  "no principals mapped to role "+roleName, new Object []{ roleName});
        logger.log(Level.WARNING,msg);
    }
      }
  }

  writeOnCommit = createPolicyFile(true,parser,writeOnCommit);

  // load excluded perms in excluded parser
  if (excludedPermissions != null) {

      PolicyParser excludedParser = new PolicyParser(false);

      Enumeration pEnum = excludedPermissions.elements();
      if (pEnum.hasMoreElements()) {
    GrantEntry grant = new GrantEntry();
    while (pEnum.hasMoreElements()) {
        Permission p = (Permission) pEnum.nextElement();
        PermissionEntry entry =
      new PermissionEntry(p.getClass().getName(),
              p.getName(),p.getActions());
        grant.add(entry);
    }
    excludedParser.add(grant);
      }
View Full Code Here

Examples of com.sun.enterprise.security.provider.PolicyParser.PermissionEntry

                                   "ignore excluded grant context", new Object []{grant});
        logger.log(Level.WARNING,msg);
    } else {
        Enumeration perms = grant.permissionEntries.elements();
        while (perms.hasMoreElements()) {
      PermissionEntry entry = (PermissionEntry) perms.nextElement();
      Permission p =
          loadPermission(entry.permission,entry.name,entry.action);
      if (result == null) {
          result = new Permissions();
      }
View Full Code Here

Examples of com.sun.enterprise.security.provider.PolicyParser.PermissionEntry

      Enumeration pEnum = uncheckedPermissions.elements();
      if (pEnum.hasMoreElements()) {
    GrantEntry grant = new GrantEntry();
    while (pEnum.hasMoreElements()) {
        Permission p = (Permission) pEnum.nextElement();
        PermissionEntry entry =
      new PermissionEntry(p.getClass().getName(),
              p.getName(),p.getActions());
        grant.add(entry);
    }
    parser.add(grant);
      }
  }

  // load role based grants in parser
  if (rolePermissionsTable != null) {
      Iterator roleIt = rolePermissionsTable.keySet().iterator();
      while (roleIt.hasNext()) {
    boolean withPrincipals = false;
    String roleName = (String) roleIt.next();
    Permissions rolePerms = getRolePermissions(roleName);
    Subject rolePrincipals = (Subject) roleToSubjectMap.get(roleName);
    if (rolePrincipals != null) {
        Iterator pit = rolePrincipals.getPrincipals().iterator();
        while (pit.hasNext()){
      Principal prin = (Principal) pit.next();

      if (prin != null) {
          withPrincipals = true;
          PrincipalEntry prinEntry =
        new PrincipalEntry(prin.getClass().getName(),
               escapeName(prin.getName()));
          GrantEntry grant = new GrantEntry();
          grant.principals.add(prinEntry);
          Enumeration pEnum = rolePerms.elements();
          while (pEnum.hasMoreElements()) {
        Permission perm = (Permission) pEnum.nextElement();
        PermissionEntry permEntry =
            new PermissionEntry(perm.getClass().getName(),
              perm.getName(),
              perm.getActions());
        grant.add(permEntry);
          }
          parser.add(grant);
      }
      else {
                            String msg = localStrings.getLocalString("pc.non_principal_mapped_to_role",
                                         "non principal mapped to role "+roleName,new Object[]{prin,roleName});
          logger.log(Level.WARNING,msg);
      }
        }
    }
    if (!withPrincipals) {
                    String msg = localStrings.getLocalString("pc.no_principals_mapped_to_role",
                                  "no principals mapped to role "+roleName, new Object []{ roleName});
        logger.log(Level.WARNING,msg);
    }
      }
  }

  writeOnCommit = createPolicyFile(true,parser,writeOnCommit);

  // load excluded perms in excluded parser
  if (excludedPermissions != null) {

      PolicyParser excludedParser = new PolicyParser(false);

      Enumeration pEnum = excludedPermissions.elements();
      if (pEnum.hasMoreElements()) {
    GrantEntry grant = new GrantEntry();
    while (pEnum.hasMoreElements()) {
        Permission p = (Permission) pEnum.nextElement();
        PermissionEntry entry =
      new PermissionEntry(p.getClass().getName(),
              p.getName(),p.getActions());
        grant.add(entry);
    }
    excludedParser.add(grant);
      }
View Full Code Here

Examples of com.sun.enterprise.security.provider.PolicyParser.PermissionEntry

                                   "ignore excluded grant context", new Object []{grant});
        logger.log(Level.WARNING,msg);
    } else {
        Enumeration perms = grant.permissionEntries.elements();
        while (perms.hasMoreElements()) {
      PermissionEntry entry = (PermissionEntry) perms.nextElement();
      Permission p =
          loadPermission(entry.permission,entry.name,entry.action);
      if (result == null) {
          result = new Permissions();
      }
View Full Code Here

Examples of com.sun.enterprise.security.provider.PolicyParser.PermissionEntry

      Enumeration pEnum = uncheckedPermissions.elements();
      if (pEnum.hasMoreElements()) {
    GrantEntry grant = new GrantEntry();
    while (pEnum.hasMoreElements()) {
        Permission p = (Permission) pEnum.nextElement();
        PermissionEntry entry =
      new PermissionEntry(p.getClass().getName(),
              p.getName(),p.getActions());
        grant.add(entry);
    }
    parser.add(grant);
      }
  }

  // load role based grants in parser
  if (rolePermissionsTable != null) {
      Iterator roleIt = rolePermissionsTable.keySet().iterator();
      while (roleIt.hasNext()) {
    boolean withPrincipals = false;
    String roleName = (String) roleIt.next();
    Permissions rolePerms = getRolePermissions(roleName);
    Subject rolePrincipals = (Subject) roleToSubjectMap.get(roleName);
    if (rolePrincipals != null) {
        Iterator pit = rolePrincipals.getPrincipals().iterator();
        while (pit.hasNext()){
      Principal prin = (Principal) pit.next();
      assert prin instanceof java.security.Principal;
      if (prin instanceof java.security.Principal) {
          withPrincipals = true;
          PrincipalEntry prinEntry =
        new PrincipalEntry(prin.getClass().getName(),
               escapeName(prin.getName()));
          GrantEntry grant = new GrantEntry();
          grant.principals.add(prinEntry);
          Enumeration pEnum = rolePerms.elements();
          while (pEnum.hasMoreElements()) {
        Permission perm = (Permission) pEnum.nextElement();
        PermissionEntry permEntry =
            new PermissionEntry(perm.getClass().getName(),
              perm.getName(),
              perm.getActions());
        grant.add(permEntry);
          }
          parser.add(grant);
      }
      else {
                            String msg = localStrings.getLocalString("pc.non_principal_mapped_to_role",
                                         "non principal mapped to role "+roleName,new Object[]{prin,roleName});
          logger.log(Level.WARNING,msg);
      }
        }
    }
    if (!withPrincipals) {
                    String msg = localStrings.getLocalString("pc.no_principals_mapped_to_role",
                                  "no principals mapped to role "+roleName, new Object []{ roleName});
        logger.log(Level.WARNING,msg);
    }
      }
  }

  writeOnCommit = createPolicyFile(true,parser,writeOnCommit);

  // load excluded perms in excluded parser
  if (excludedPermissions != null) {

      PolicyParser excludedParser = new PolicyParser(false);

      Enumeration pEnum = excludedPermissions.elements();
      if (pEnum.hasMoreElements()) {
    GrantEntry grant = new GrantEntry();
    while (pEnum.hasMoreElements()) {
        Permission p = (Permission) pEnum.nextElement();
        PermissionEntry entry =
      new PermissionEntry(p.getClass().getName(),
              p.getName(),p.getActions());
        grant.add(entry);
    }
    excludedParser.add(grant);
      }
View Full Code Here

Examples of com.sun.enterprise.security.provider.PolicyParser.PermissionEntry

                                   "ignore excluded grant context", new Object []{grant});
        logger.log(Level.WARNING,msg);
    } else {
        Enumeration perms = grant.permissionEntries.elements();
        while (perms.hasMoreElements()) {
      PermissionEntry entry = (PermissionEntry) perms.nextElement();
      Permission p =
          loadPermission(entry.permission,entry.name,entry.action);
      if (result == null) {
          result = new Permissions();
      }
View Full Code Here

Examples of org.wso2.carbon.registry.resource.beans.PermissionEntry

        for (String raUser : raUsers) {
            if (raUser.equals(systemUserName) || raUser.equals(adminUserName)) {
                continue;
            }
            if (userPermissionMap.containsKey(raUser)) {
                PermissionEntry permission = userPermissionMap.get(raUser);
                permission.setReadAllow(true);
            } else {
                PermissionEntry permission = new PermissionEntry();
                permission.setUserName(raUser);
                permission.setReadAllow(true);
                userPermissionMap.put(raUser, permission);
            }
        }

        String[] rdUsers = authorizer.getExplicitlyDeniedUsersForResource(path, ActionConstants.GET);
        for (String rdUser : rdUsers) {
            if (rdUser.equals(systemUserName) || rdUser.equals(adminUserName)) {
                continue;
            }
            if (userPermissionMap.containsKey(rdUser)) {
                PermissionEntry permission = userPermissionMap.get(rdUser);
                permission.setReadDeny(true);
            } else {
                PermissionEntry permission = new PermissionEntry();
                permission.setUserName(rdUser);
                permission.setReadDeny(true);
                userPermissionMap.put(rdUser, permission);
            }
        }

        String[] waUsers = authorizer.getExplicitlyAllowedUsersForResource(path, ActionConstants.PUT);
        for (String waUser : waUsers) {
            if (waUser.equals(systemUserName) || waUser.equals(adminUserName)) {
                continue;
            }
            if (userPermissionMap.containsKey(waUser)) {
                PermissionEntry permission = userPermissionMap.get(waUser);
                permission.setWriteAllow(true);
            } else {
                PermissionEntry permission = new PermissionEntry();
                permission.setUserName(waUser);
                permission.setWriteAllow(true);
                userPermissionMap.put(waUser, permission);
            }
        }
       
        String[] wdUsers = authorizer.getExplicitlyDeniedUsersForResource(path, ActionConstants.PUT);
        for (String wdUser : wdUsers) {
            if (wdUser.equals(systemUserName) || wdUser.equals(adminUserName)) {
                continue;
            }
            if (userPermissionMap.containsKey(wdUser)) {
                PermissionEntry permission = userPermissionMap.get(wdUser);
                permission.setWriteDeny(true);
            } else {
                PermissionEntry permission = new PermissionEntry();
                permission.setUserName(wdUser);
                permission.setWriteDeny(true);
                userPermissionMap.put(wdUser, permission);
            }
        }

        String[] daUsers = authorizer.getExplicitlyAllowedUsersForResource(path, ActionConstants.DELETE);
        for (String daUser : daUsers) {
            if (daUser.equals(systemUserName) || daUser.equals(adminUserName)) {
                continue;
            }
            if (userPermissionMap.containsKey(daUser)) {
                PermissionEntry permission = userPermissionMap.get(daUser);
                permission.setDeleteAllow(true);
            } else {
                PermissionEntry permission = new PermissionEntry();
                permission.setUserName(daUser);
                permission.setDeleteAllow(true);
                userPermissionMap.put(daUser, permission);
            }
        }

        String[] ddUsers = authorizer.getExplicitlyDeniedUsersForResource(path, ActionConstants.DELETE);
        for (String ddUser : ddUsers) {
            if (ddUser.equals(systemUserName) || ddUser.equals(adminUserName)) {
                continue;
            }
            if (userPermissionMap.containsKey(ddUser)) {
                PermissionEntry permission = userPermissionMap.get(ddUser);
                permission.setDeleteDeny(true);
            } else {
                PermissionEntry permission = new PermissionEntry();
                permission.setUserName(ddUser);
                permission.setDeleteDeny(true);
                userPermissionMap.put(ddUser, permission);
            }
        }


        String[] aaUsers = authorizer.
                getExplicitlyAllowedUsersForResource(path, AccessControlConstants.AUTHORIZE);
        for (String aaUser : aaUsers) {
            if (aaUser.equals(systemUserName) || aaUser.equals(adminUserName)) {
                continue;
            }
            if (userPermissionMap.containsKey(aaUser)) {
                PermissionEntry permission = userPermissionMap.get(aaUser);
                permission.setAuthorizeAllow(true);
            } else {
                PermissionEntry permission = new PermissionEntry();
                permission.setUserName(aaUser);
                permission.setAuthorizeAllow(true);
                userPermissionMap.put(aaUser, permission);
            }
        }
        String[] adUsers = authorizer.
                getExplicitlyDeniedUsersForResource(path, AccessControlConstants.AUTHORIZE);
        for (String adUser : adUsers) {
            if (adUser.equals(systemUserName) || adUser.equals(adminUserName)) {
                continue;
            }
            if (userPermissionMap.containsKey(adUser)) {
                PermissionEntry permission = userPermissionMap.get(adUser);
                permission.setAuthorizeDeny(true);
            } else {
                PermissionEntry permission = new PermissionEntry();
                permission.setUserName(adUser);
                permission.setAuthorizeDeny(true);
                userPermissionMap.put(adUser, permission);
            }
        }

View Full Code Here

Examples of org.wso2.carbon.registry.resource.beans.PermissionEntry

        for (String raRole : raRoles) {
            if (raRole.equals(adminRoleName)) {
                continue;
            }
            if (rolePermissionMap.containsKey(raRole)) {
                PermissionEntry permission = rolePermissionMap.get(raRole);
                permission.setReadAllow(true);
            } else {
                PermissionEntry permission = new PermissionEntry();
                permission.setUserName(raRole);
                permission.setReadAllow(true);
                rolePermissionMap.put(raRole, permission);
            }
        }

        String[] rdRoles = authorizer.getDeniedRolesForResource(path, ActionConstants.GET);
        for (String rdRole : rdRoles) {
            if (rolePermissionMap.containsKey(rdRole)) {
                PermissionEntry permission = rolePermissionMap.get(rdRole);
                permission.setReadDeny(true);
            } else {
                PermissionEntry permission = new PermissionEntry();
                permission.setUserName(rdRole);
                permission.setReadDeny(true);
                rolePermissionMap.put(rdRole, permission);
            }
        }


        String[] waRoles = authorizer.getAllowedRolesForResource(path, ActionConstants.PUT);
        for (String waRole : waRoles) {
            if (waRole.equals(adminRoleName)) {
                continue;
            }
            if (rolePermissionMap.containsKey(waRole)) {
                PermissionEntry permission = rolePermissionMap.get(waRole);
                permission.setWriteAllow(true);
            } else {
                PermissionEntry permission = new PermissionEntry();
                permission.setUserName(waRole);
                permission.setWriteAllow(true);
                rolePermissionMap.put(waRole, permission);
            }
        }

        String[] wdRoles = authorizer.getDeniedRolesForResource(path, ActionConstants.PUT);
        for (String wdRole : wdRoles) {
            if (rolePermissionMap.containsKey(wdRole)) {
                PermissionEntry permission = rolePermissionMap.get(wdRole);
                permission.setWriteDeny(true);
            } else {
                PermissionEntry permission = new PermissionEntry();
                permission.setUserName(wdRole);
                permission.setWriteDeny(true);
                rolePermissionMap.put(wdRole, permission);
            }
        }
       
        String[] daRoles = authorizer.getAllowedRolesForResource(path, ActionConstants.DELETE);
        for (String daRole : daRoles) {
            if (daRole.equals(adminRoleName)) {
                continue;
            }
            if (rolePermissionMap.containsKey(daRole)) {
                PermissionEntry permission = rolePermissionMap.get(daRole);
                permission.setDeleteAllow(true);
            } else {
                PermissionEntry permission = new PermissionEntry();
                permission.setUserName(daRole);
                permission.setDeleteAllow(true);
                rolePermissionMap.put(daRole, permission);
            }
        }
       
        String[] ddRoles = authorizer.getDeniedRolesForResource(path, ActionConstants.DELETE);
        for (String ddRole : ddRoles) {
            if (rolePermissionMap.containsKey(ddRole)) {
                PermissionEntry permission = rolePermissionMap.get(ddRole);
                permission.setDeleteDeny(true);
            } else {
                PermissionEntry permission = new PermissionEntry();
                permission.setUserName(ddRole);
                permission.setDeleteDeny(true);
                rolePermissionMap.put(ddRole, permission);
            }
        }


        String[] aaRoles = authorizer.
                getAllowedRolesForResource(path, AccessControlConstants.AUTHORIZE);
        for (String aaRole : aaRoles) {
            if (aaRole.equals(adminRoleName)) {
                continue;
            }
            if (rolePermissionMap.containsKey(aaRole)) {
                PermissionEntry permission = rolePermissionMap.get(aaRole);
                permission.setAuthorizeAllow(true);
            } else {
                PermissionEntry permission = new PermissionEntry();
                permission.setUserName(aaRole);
                permission.setAuthorizeAllow(true);
                rolePermissionMap.put(aaRole, permission);
            }
        }
       
        String[] adRoles = authorizer.
                getDeniedRolesForResource(path, AccessControlConstants.AUTHORIZE);
        for (String adRole : adRoles) {
            if (rolePermissionMap.containsKey(adRole)) {
                PermissionEntry permission = rolePermissionMap.get(adRole);
                permission.setAuthorizeDeny(true);
            } else {
                PermissionEntry permission = new PermissionEntry();
                permission.setUserName(adRole);
                permission.setAuthorizeDeny(true);
                rolePermissionMap.put(adRole, permission);
            }
        }

View Full Code Here

Examples of sun.security.provider.PolicyParser.PermissionEntry

                                   "ignore excluded grant context", new Object []{grant});
        logger.log(Level.WARNING,msg);
    } else {
        Enumeration perms = grant.permissionEntries.elements();
        while (perms.hasMoreElements()) {
      PermissionEntry entry = (PermissionEntry) perms.nextElement();
      Permission p =
          loadPermission(entry.permission,entry.name,entry.action);
      if (result == null) {
          result = new Permissions();
      }
View Full Code Here
TOP
Copyright © 2018 www.massapi.com. All rights reserved.
All source code are property of their respective owners. Java is a trademark of Sun Microsystems, Inc and owned by ORACLE Inc. Contact coftware#gmail.com.