PrivilegeValidator(@NotNull Root before, @NotNull Root after, @NotNull TreeProvider treeProvider) { rootBefore = before; rootAfter = after; bitsProvider = new PrivilegeBitsProvider(rootBefore); this.treeProvider = treeProvider; }
PrivilegeValidator(@NotNull Root before, @NotNull Root after, @NotNull TreeProvider treeProvider) { rootBefore = before; rootAfter = after; bitsProvider = new PrivilegeBitsProvider(rootBefore); this.treeProvider = treeProvider; }
@NotNull @Override public PrivilegeBits supportedPrivileges(@Nullable Tree tree, @Nullable PrivilegeBits privilegeBits) { return (privilegeBits != null) ? privilegeBits : new PrivilegeBitsProvider(immutableRoot).getBits(PrivilegeConstants.JCR_ALL); }
@NotNull @Override public PrivilegeBits supportedPrivileges(@Nullable Tree tree, @Nullable PrivilegeBits privilegeBits) { return (privilegeBits != null) ? privilegeBits : new PrivilegeBitsProvider(immutableRoot).getBits(PrivilegeConstants.JCR_ALL); }
@NotNull @Override public PrivilegeBits supportedPrivileges(@Nullable Tree tree, @Nullable PrivilegeBits privilegeBits) { return (privilegeBits != null) ? privilegeBits : new PrivilegeBitsProvider(immutableRoot).getBits(PrivilegeConstants.JCR_ALL); }
@Nonnull @Override public PrivilegeBits supportedPrivileges(@Nullable Tree tree, @Nullable PrivilegeBits privilegeBits) { return (privilegeBits != null) ? privilegeBits : new PrivilegeBitsProvider(immutableRoot).getBits(PrivilegeConstants.JCR_ALL); }
@Override public void refresh() { immutableRoot = rootProvider.createReadOnlyRoot(root); privilegeBitsProvider = new PrivilegeBitsProvider(immutableRoot); for (PermissionProvider pp : pps) { pp.refresh(); } }
@Override public void refresh() { immutableRoot = rootProvider.createReadOnlyRoot(root); privilegeBitsProvider = new PrivilegeBitsProvider(immutableRoot); for (PermissionProvider pp : pps) { pp.refresh(); } }
@Override public void refresh() { immutableRoot = rootProvider.createReadOnlyRoot(root); privilegeBitsProvider = new PrivilegeBitsProvider(immutableRoot); for (PermissionProvider pp : pps) { pp.refresh(); } }
@Override public void before() throws Exception { super.before(); bitsProvider = new PrivilegeBitsProvider(root); }
@Override public void before() throws Exception { super.before(); bitsProvider = new PrivilegeBitsProvider(root); }
public AccessControlManagerImpl(@NotNull Root root, @NotNull NamePathMapper namePathMapper, @NotNull SecurityProvider securityProvider) { super(root, namePathMapper, securityProvider); bitsProvider = new PrivilegeBitsProvider(root); ntMgr = ReadOnlyNodeTypeManager.getInstance(root, namePathMapper); principalManager = securityProvider.getConfiguration(PrincipalConfiguration.class).getPrincipalManager(root, namePathMapper); restrictionProvider = getConfig().getRestrictionProvider(); configParams = getConfig().getParameters(); readPaths = configParams.getConfigValue(PermissionConstants.PARAM_READ_PATHS, PermissionConstants.DEFAULT_READ_PATHS); }
@Before public void before() { privTree = Mockito.mock(Tree.class); root = Mockito.mock(Root.class); when(root.getTree(PRIVILEGES_PATH)).thenReturn(privTree); pTree = Mockito.mock(Tree.class); when(pTree.getName()).thenReturn(KNOWN_PRIV_NAME); when(pTree.getProperty(REP_BITS)).thenReturn(ps); bitsProvider = new PrivilegeBitsProvider(root); }
PrivilegeDefinitionWriter(Root root) { this.root = root; this.bitsMgr = new PrivilegeBitsProvider(root); Tree privilegesTree = bitsMgr.getPrivilegesTree(); if (privilegesTree.exists() && privilegesTree.hasProperty(REP_NEXT)) { next = PrivilegeBits.getInstance(privilegesTree); } else { next = PrivilegeBits.NEXT_AFTER_BUILT_INS; } }
@Override @Before public void before() throws Exception { super.before(); bitsProvider = new PrivilegeBitsProvider(root); }
@Override PrivilegeBits getPrivilegeBits(Privilege[] privileges) { return new PrivilegeBitsProvider(root).getBits(privileges, getNamePathMapper()); } };
@Before public void before() throws Exception { super.before(); bitsProvider = new PrivilegeBitsProvider(root); privilegesTree = checkNotNull(bitsProvider.getPrivilegesTree()); }
@Test public void testSupportedPrivileges() { PrivilegeBits bts = new PrivilegeBitsProvider(root).getBits(PrivilegeConstants.JCR_READ); for (String acPath : acPaths) { assertSame(PrivilegeBits.EMPTY, pp.supportedPrivileges(root.getTree(acPath), bts)); } }
@Test public void testSupportedPrivileges() { PrivilegeBits bits = new PrivilegeBitsProvider(root).getBits(PrivilegeConstants.JCR_READ); for (String p : PATHS) { assertTrue(p, cugPermProvider.supportedPrivileges(root.getTree(p), bits).isEmpty()); } }
@Test public void testPrivilegeBits() { Tree jcrReadTree = PrivilegeUtil.getPrivilegesTree(root).getChild(PrivilegeConstants.JCR_READ); Tree repWriteTree = PrivilegeUtil.getPrivilegesTree(root).getChild(PrivilegeConstants.REP_WRITE); PrivilegeBitsProvider provider = new PrivilegeBitsProvider(root); PrivilegeBits privilegeBits = provider.getBits(PrivilegeConstants.REP_WRITE, PrivilegeBits.JCR_READ); PrivilegeBits readBits = PrivilegeBits.getInstance(jcrReadTree); PrivilegeBits writeBits = PrivilegeBits.getInstance(jcrReadTree); // EXERCISE: play with 'PrivilegeBits' methods to compare 'privilegeBits' with 'readBits' and 'writeBits' // EXERCISE: retrieve the property that stores the long representation of each privilege above }