public static boolean resourceIsContainedInArray(Integer resourceTypeId, Resource[] list) { for (Resource resource : list) { if (resourceTypeId == resource.resourceType()) { return true; } } return false; } }
public void checkAuthorization(CompositePermissionCheck compositePermissionCheck) { if(isAuthCheckExecuted()) { Authentication currentAuthentication = getCurrentAuthentication(); String userId = currentAuthentication.getUserId(); boolean isAuthorized = isAuthorized(compositePermissionCheck); if (!isAuthorized) { List<MissingAuthorization> missingAuthorizations = new ArrayList<MissingAuthorization>(); for (PermissionCheck check: compositePermissionCheck.getAllPermissionChecks()) { missingAuthorizations.add(new MissingAuthorization( check.getPermission().getName(), check.getResource().resourceName(), check.getResourceId())); } throw new AuthorizationException(userId, missingAuthorizations); } } }
public void checkAuthorization(List<PermissionCheck> permissionChecks) { if(isAuthCheckExecuted()) { Authentication currentAuthentication = getCurrentAuthentication(); String userId = currentAuthentication.getUserId(); boolean isAuthorized = isAuthorized(userId, currentAuthentication.getGroupIds(), permissionChecks); if (!isAuthorized) { List<MissingAuthorization> missingAuthorizations = new ArrayList<MissingAuthorization>(); for (PermissionCheck check: permissionChecks) { missingAuthorizations.add(new MissingAuthorization( check.getPermission().getName(), check.getResource().resourceName(), check.getResourceId())); } throw new AuthorizationException(userId, missingAuthorizations); } } }
public void setResource(Resource resource) { this.resource = resource; if (resource != null) { resourceType = resource.resourceType(); } }
public void checkAuthorization(List<PermissionCheck> permissionChecks) { if(isAuthCheckExecuted()) { Authentication currentAuthentication = getCurrentAuthentication(); String userId = currentAuthentication.getUserId(); boolean isAuthorized = isAuthorized(userId, currentAuthentication.getGroupIds(), permissionChecks); if (!isAuthorized) { List<MissingAuthorization> missingAuthorizations = new ArrayList<MissingAuthorization>(); for (PermissionCheck check: permissionChecks) { missingAuthorizations.add(new MissingAuthorization( check.getPermission().getName(), check.getResource().resourceName(), check.getResourceId())); } throw new AuthorizationException(userId, missingAuthorizations); } } }
public void setResource(Resource resource) { this.resource = resource; if (resource != null) { resourceType = resource.resourceType(); } }
public void checkAuthorization(CompositePermissionCheck compositePermissionCheck) { if(isAuthCheckExecuted()) { Authentication currentAuthentication = getCurrentAuthentication(); String userId = currentAuthentication.getUserId(); boolean isAuthorized = isAuthorized(compositePermissionCheck); if (!isAuthorized) { List<MissingAuthorization> missingAuthorizations = new ArrayList<MissingAuthorization>(); for (PermissionCheck check: compositePermissionCheck.getAllPermissionChecks()) { missingAuthorizations.add(new MissingAuthorization( check.getPermission().getName(), check.getResource().resourceName(), check.getResourceId())); } throw new AuthorizationException(userId, missingAuthorizations); } } }
public static boolean resourceIsContainedInArray(Integer resourceTypeId, Resource[] list) { for (Resource resource : list) { if (resourceTypeId == resource.resourceType()) { return true; } } return false; } }
@Override public void checkAuthorization(Permission permission, Resource resource, String resourceId) { if(isAuthCheckExecuted()) { Authentication currentAuthentication = getCurrentAuthentication(); boolean isAuthorized = isAuthorized(currentAuthentication.getUserId(), currentAuthentication.getGroupIds(), permission, resource, resourceId); if (!isAuthorized) { throw new AuthorizationException( currentAuthentication.getUserId(), permission.getName(), resource.resourceName(), resourceId); } } }
public void setResource(Resource resource) { this.resourceType = resource.resourceType(); }
@Override public void checkAuthorization(Permission permission, Resource resource, String resourceId) { if(isAuthCheckExecuted()) { Authentication currentAuthentication = getCurrentAuthentication(); boolean isAuthorized = isAuthorized(currentAuthentication.getUserId(), currentAuthentication.getGroupIds(), permission, resource, resourceId); if (!isAuthorized) { throw new AuthorizationException( currentAuthentication.getUserId(), permission.getName(), resource.resourceName(), resourceId); } } }
public void setResource(Resource resource) { this.resourceType = resource.resourceType(); }
public boolean isAuthorized(String userId, List<String> groupIds, CompositePermissionCheck compositePermissionCheck) { for (PermissionCheck permissionCheck : compositePermissionCheck.getAllPermissionChecks()) { if (!isResourceValidForPermission(permissionCheck)) { throw LOG.invalidResourceForPermission(permissionCheck.getResource().resourceName(), permissionCheck.getPermission().getName()); } } List<String> filteredGroupIds = filterAuthenticatedGroupIds(groupIds); boolean isRevokeAuthorizationCheckEnabled = isRevokeAuthCheckEnabled(userId, groupIds); AuthorizationCheck authCheck = new AuthorizationCheck(userId, filteredGroupIds, compositePermissionCheck, isRevokeAuthorizationCheckEnabled); return getDbEntityManager().selectBoolean("isUserAuthorizedForResource", authCheck); }
public AuthorizationQuery resourceType(Resource resource) { return resourceType(resource.resourceType()); }
public boolean isAuthorized(String userId, List<String> groupIds, CompositePermissionCheck compositePermissionCheck) { for (PermissionCheck permissionCheck : compositePermissionCheck.getAllPermissionChecks()) { if (!isResourceValidForPermission(permissionCheck)) { throw LOG.invalidResourceForPermission(permissionCheck.getResource().resourceName(), permissionCheck.getPermission().getName()); } } List<String> filteredGroupIds = filterAuthenticatedGroupIds(groupIds); boolean isRevokeAuthorizationCheckEnabled = isRevokeAuthCheckEnabled(userId, groupIds); AuthorizationCheck authCheck = new AuthorizationCheck(userId, filteredGroupIds, compositePermissionCheck, isRevokeAuthorizationCheckEnabled); return getDbEntityManager().selectBoolean("isUserAuthorizedForResource", authCheck); }
public AuthorizationQuery resourceType(Resource resource) { return resourceType(resource.resourceType()); }
public boolean isAuthorized(String userId, List<String> groupIds, List<PermissionCheck> permissionChecks) { if(!isAuthorizationEnabled()) { return true; } for (PermissionCheck permissionCheck : permissionChecks) { if (!isResourceValidForPermission(permissionCheck)) { throw LOG.invalidResourceForPermission(permissionCheck.getResource().resourceName(), permissionCheck.getPermission().getName()); } } List<String> filteredGroupIds = filterAuthenticatedGroupIds(groupIds); boolean isRevokeAuthorizationCheckEnabled = isRevokeAuthCheckEnabled(userId, groupIds); AuthorizationCheck authCheck = new AuthorizationCheck(userId, filteredGroupIds, permissionChecks, isRevokeAuthorizationCheckEnabled); return getDbEntityManager().selectBoolean("isUserAuthorizedForResource", authCheck); }
public AuthorizationEntity findAuthorization(int type, String userId, String groupId, Resource resource, String resourceId) { Map<String, Object> params = new HashMap<String, Object>(); params.put("type", type); params.put("userId", userId); params.put("groupId", groupId); params.put("resourceId", resourceId); if (resource != null) { params.put("resourceType", resource.resourceType()); } return (AuthorizationEntity) getDbEntityManager().selectOne("selectAuthorizationByParameters", params); }
public boolean isAuthorized(String userId, List<String> groupIds, List<PermissionCheck> permissionChecks) { if(!isAuthorizationEnabled()) { return true; } for (PermissionCheck permissionCheck : permissionChecks) { if (!isResourceValidForPermission(permissionCheck)) { throw LOG.invalidResourceForPermission(permissionCheck.getResource().resourceName(), permissionCheck.getPermission().getName()); } } List<String> filteredGroupIds = filterAuthenticatedGroupIds(groupIds); boolean isRevokeAuthorizationCheckEnabled = isRevokeAuthCheckEnabled(userId, groupIds); AuthorizationCheck authCheck = new AuthorizationCheck(userId, filteredGroupIds, permissionChecks, isRevokeAuthorizationCheckEnabled); return getDbEntityManager().selectBoolean("isUserAuthorizedForResource", authCheck); }
public AuthorizationEntity findAuthorization(int type, String userId, String groupId, Resource resource, String resourceId) { Map<String, Object> params = new HashMap<String, Object>(); params.put("type", type); params.put("userId", userId); params.put("groupId", groupId); params.put("resourceId", resourceId); if (resource != null) { params.put("resourceType", resource.resourceType()); } return (AuthorizationEntity) getDbEntityManager().selectOne("selectAuthorizationByParameters", params); }