public List<PrivilegeDescriptor> listPrivilegeDescriptors() { return manager.listPrivilegeDescriptors(); }
public void cleanRemovedPrivilege( String privilegeId ) { manager.cleanRemovedPrivilege( privilegeId ); }
public List<CUserRoleMapping> listUserRoleMappings() { return manager.listUserRoleMappings(); }
@Override public void run() throws Exception { configuration.createPrivilege( secPriv ); configuration.save(); } });
@Override public void run() throws Exception { configuration.updateRole( secRole ); configuration.save(); } });
@Override public void run() throws Exception { configuration.createRole( secRole ); configuration.save(); } });
protected void cleanupPrivileges( String propertyId, String propertyValue ) throws NoSuchPrivilegeException, NoSuchAuthorizationManagerException { Set<Privilege> privileges = security.listPrivileges(); Set<String> removedIds = new HashSet<String>(); for ( Privilege privilege : privileges ) { if ( !privilege.isReadOnly() && privilege.getType().equals( TargetPrivilegeDescriptor.TYPE ) && ( propertyValue.equals( privilege.getPrivilegeProperty( propertyId ) ) ) ) { getLogger().debug( "Removing Privilege " + privilege.getName() + " because repository was removed" ); security.getAuthorizationManager( SecurityXmlAuthorizationManager.SOURCE ).deletePrivilege( privilege.getId() ); removedIds.add( privilege.getId() ); } } for ( String privilegeId : removedIds ) { configManager.cleanRemovedPrivilege( privilegeId ); } configManager.save(); } }
@Override public void run() throws Exception { configuration.deletePrivilege( privilegeId ); configuration.save(); } });
@Override public void run() throws Exception { configuration.deleteRole( roleId ); configuration.save(); } });
@Override public void run() throws Exception { configuration.updatePrivilege( secPriv ); configuration.save(); } });
public void save() { // The static config can't be updated, so delegate to xml file manager.save(); }
@Override public void run() throws Exception { try { user.setPassword(passwordService.encryptPassword(password)); configuration.updateUser(user); configuration.save(); } catch(Exception e) { //Update failed, rollback to previous values user.setPassword(currentPasswordHash); logger.error("Unable to update hash for user {}", user.getId()); } } });
public void run() throws Exception { configuration.createUser( secUser, getRoleIdsFromUser( user ) ); saveConfiguration(); } });
public void createPrivilege( CPrivilege privilege ) throws InvalidConfigurationException { manager.createPrivilege( privilege, initializeContext() ); }
public void createRole( CRole role ) throws InvalidConfigurationException { manager.createRole( role, initializeContext() ); }
@Override public void clearCache() { checkWriteLock(); configurationManager.clearCache(); }
public void cleanRemovedRole( String roleId ) { manager.cleanRemovedRole( roleId ); }
private void saveConfiguration() { this.configuration.save(); }
@Override public void createUser(CUser user, Set<String> roles, SecurityValidationContext context) throws InvalidConfigurationException { checkWriteLock(); configurationManager.createUser(user, roles, context); }
@Override public void createPrivilege(CPrivilege privilege) throws InvalidConfigurationException { checkWriteLock(); configurationManager.createPrivilege(privilege); }