@Override public ACE[] getSecurity () throws IOException { return getSecurity(false); }
@Override public ACE[] getSecurity () throws IOException { return getSecurity(false); }
/** * Return an array of Access Control Entry (ACE) objects representing * the security descriptor associated with this file or directory. * <p> * Initially, the SIDs within each ACE will not be resolved however when * <tt>getType()</tt>, <tt>getDomainName()</tt>, <tt>getAccountName()</tt>, * or <tt>toString()</tt> is called, the names will attempt to be * resolved. If the names cannot be resolved (e.g. due to temporary * network failure), the said methods will return default values (usually * <tt>S-X-Y-Z</tt> strings of fragments of). * <p> * Alternatively <tt>getSecurity(true)</tt> may be used to resolve all * SIDs together and detect network failures. */ public ACE[] getSecurity() throws IOException { return getSecurity(false); } // >>SmbAuthenticator
/** * Return an array of Access Control Entry (ACE) objects representing * the security descriptor associated with this file or directory. * <p> * Initially, the SIDs within each ACE will not be resolved however when * <tt>getType()</tt>, <tt>getDomainName()</tt>, <tt>getAccountName()</tt>, * or <tt>toString()</tt> is called, the names will attempt to be * resolved. If the names cannot be resolved (e.g. due to temporary * network failure), the said methods will return default values (usually * <tt>S-X-Y-Z</tt> strings of fragments of). * <p> * Alternatively <tt>getSecurity(true)</tt> may be used to resolve all * SIDs together and detect network failures. */ public ACE[] getSecurity() throws IOException { return getSecurity(false); }
/** * Return an array of Access Control Entry (ACE) objects representing * the security descriptor associated with this file or directory. * <p> * Initially, the SIDs within each ACE will not be resolved however when * <tt>getType()</tt>, <tt>getDomainName()</tt>, <tt>getAccountName()</tt>, * or <tt>toString()</tt> is called, the names will attempt to be * resolved. If the names cannot be resolved (e.g. due to temporary * network failure), the said methods will return default values (usually * <tt>S-X-Y-Z</tt> strings of fragments of). * <p> * Alternatively <tt>getSecurity(true)</tt> may be used to resolve all * SIDs together and detect network failures. */ public ACE[] getSecurity() throws IOException { return getSecurity(false); }
/** * Return an array of Access Control Entry (ACE) objects representing * the security descriptor associated with this file or directory. * <p> * Initially, the SIDs within each ACE will not be resolved however when * <tt>getType()</tt>, <tt>getDomainName()</tt>, <tt>getAccountName()</tt>, * or <tt>toString()</tt> is called, the names will attempt to be * resolved. If the names cannot be resolved (e.g. due to temporary * network failure), the said methods will return default values (usually * <tt>S-X-Y-Z</tt> strings of fragments of). * <p> * Alternatively <tt>getSecurity(true)</tt> may be used to resolve all * SIDs together and detect network failures. */ public ACE[] getSecurity() throws IOException { return getSecurity(false); }
protected void processAccessControlEntries(final ResponseData responseData, final SmbFile file) { try { final ACE[] aces = file.getSecurity(resolveSids); if (aces != null) { responseData.addMetaData(SMB_ACCESS_CONTROL_ENTRIES, aces); } } catch (final IOException e) { throw new RobotCrawlAccessException("Could not access " + file.getPath(), e); } }
protected void processAccessControlEntries(final ResponseData responseData, final SmbFile file) { try { final ACE[] aces = file.getSecurity(resolveSids); if (aces != null) { final Set<SID> sidSet = new HashSet<>(); for (ACE ace : aces) { if (logger.isDebugEnabled()) { logger.debug("ACE:" + ace); } processAllowedSIDs(file, ace.getSID(), sidSet); } responseData.addMetaData(SMB_ALLOWED_SID_ENTRIES, sidSet.toArray(new SID[sidSet.size()])); } } catch (final IOException e) { throw new CrawlingAccessException("Could not access " + file.getPath(), e); } }
protected void processAccessControlEntries(final ResponseData responseData, final SmbFile file) { try { final ACE[] aces = file.getSecurity(resolveSids); if (aces != null) { responseData.addMetaData(SMB_ACCESS_CONTROL_ENTRIES, aces); } } catch (final IOException e) { throw new RobotCrawlAccessException("Could not access " + file.getPath(), e); } }
protected void processAccessControlEntries(final ResponseData responseData, final SmbFile file) { try { final ACE[] aces = file.getSecurity(resolveSids); if (aces != null) { responseData.addMetaData(SMB_ACCESS_CONTROL_ENTRIES, aces); } } catch (final IOException e) { throw new RobotCrawlAccessException("Could not access " + file.getPath(), e); } }