@Override public String getName() { return sensitivity.getName(); }
@Override public String getName() { return sensitivity.getName(); }
@Override public String getName() { return sensitivity.getName(); }
private static Map<String, Map<String, SensitivityClassification>> getSensitivityClassifications(){ Collection<SensitivityClassification> current = SensitiveTargetConstraint.FACTORY.getSensitivities(); if (classifications == null || classifications.size() != current.size()) { Map<String, Map<String, SensitivityClassification>> classificationsMap = new TreeMap<String, Map<String,SensitivityClassification>>(); for (SensitivityClassification classification : current) { final String type = classification.isCore() ? CORE : classification.getSubsystem(); Map<String, SensitivityClassification> byName = classificationsMap.get(type); if (byName == null) { byName = new TreeMap<String, SensitivityClassification>(); classificationsMap.put(type, byName); } byName.put(classification.getName(), classification); } classifications = classificationsMap; } return classifications; }
private static Map<String, Map<String, SensitivityClassification>> getSensitivityClassifications(){ Collection<SensitivityClassification> current = SensitiveTargetConstraint.FACTORY.getSensitivities(); if (classifications == null || classifications.size() != current.size()) { Map<String, Map<String, SensitivityClassification>> classificationsMap = new TreeMap<String, Map<String,SensitivityClassification>>(); for (SensitivityClassification classification : current) { final String type = classification.isCore() ? CORE : classification.getSubsystem(); Map<String, SensitivityClassification> byName = classificationsMap.get(type); if (byName == null) { byName = new TreeMap<String, SensitivityClassification>(); classificationsMap.put(type, byName); } byName.put(classification.getName(), classification); } classifications = classificationsMap; } return classifications; }
public SensitiveTargetAccessConstraintDefinition(SensitivityClassification sensitivity) { // Register this sensitivity, and if a compatible one is already registered, use that instead final SensitivityClassification toUse = SensitiveTargetConstraint.FACTORY.addSensitivity(sensitivity); this.sensitivity = toUse; this.key = new AccessConstraintKey(ModelDescriptionConstants.SENSITIVITY_CLASSIFICATION, toUse.isCore(), toUse.getSubsystem(), toUse.getName()); }
public SensitiveTargetAccessConstraintDefinition(SensitivityClassification sensitivity) { this.sensitivity = sensitivity; this.key = new AccessConstraintKey(ModelDescriptionConstants.SENSITIVITY_CLASSIFICATION, sensitivity.isCore(), sensitivity.getSubsystem(), sensitivity.getName()); SensitiveTargetConstraint.FACTORY.addSensitivity(sensitivity); }
public SensitiveTargetAccessConstraintDefinition(SensitivityClassification sensitivity) { // Register this sensitivity, and if a compatible one is already registered, use that instead final SensitivityClassification toUse = SensitiveTargetConstraint.FACTORY.addSensitivity(sensitivity); this.sensitivity = toUse; this.key = new AccessConstraintKey(ModelDescriptionConstants.SENSITIVITY_CLASSIFICATION, toUse.isCore(), toUse.getSubsystem(), toUse.getName()); }
static ChainedTransformationDescriptionBuilder buildTransformerChain() { // Discard the domain level core-service=management resource and its children unless RBAC is enabled // Configuring rbac details is OK (i.e. discarable), so long as the provider is not enabled ChainedTransformationDescriptionBuilder chainedBuilder = createChainFromCurrent(CoreManagementResourceDefinition.PATH_ELEMENT); ResourceTransformationDescriptionBuilder builder18To17 = createBuilder(chainedBuilder, KernelAPIVersion.VERSION_1_8, KernelAPIVersion.VERSION_1_7); builder18To17.addChildResource(AccessAuthorizationResourceDefinition.PATH_ELEMENT) .addChildResource(AccessConstraintResources.SENSITIVITY_PATH_ELEMENT) .addChildResource(SensitivityClassificationTypeResourceDefinition.PATH_ELEMENT) .discardChildResource(PathElement.pathElement(SensitivityResourceDefinition.PATH_ELEMENT.getKey(), SensitivityClassification.SERVER_SSL.getName())) .build(); ResourceTransformationDescriptionBuilder builderCurrentTo41 = createBuilderFromCurrent(chainedBuilder, KernelAPIVersion.VERSION_4_1); ResourceTransformationDescriptionBuilder childResource = builderCurrentTo41.addChildResource(AccessAuthorizationResourceDefinition.PATH_ELEMENT) .addChildResource(AccessConstraintResources.SENSITIVITY_PATH_ELEMENT) .addChildResource(SensitivityClassificationTypeResourceDefinition.PATH_ELEMENT); childResource.discardChildResource(PathElement.pathElement(SensitivityResourceDefinition.PATH_ELEMENT.getKey(), SensitivityClassification.AUTHENTICATION_CLIENT_REF.getName())).build(); childResource.discardChildResource(PathElement.pathElement(SensitivityResourceDefinition.PATH_ELEMENT.getKey(), SensitivityClassification.AUTHENTICATION_FACTORY_REF.getName())).build(); childResource.discardChildResource(PathElement.pathElement(SensitivityResourceDefinition.PATH_ELEMENT.getKey(), SensitivityClassification.ELYTRON_SECURITY_DOMAIN_REF.getName())).build(); childResource.discardChildResource(PathElement.pathElement(SensitivityResourceDefinition.PATH_ELEMENT.getKey(), SensitivityClassification.SSL_REF.getName())).build(); return chainedBuilder; } }
static ChainedTransformationDescriptionBuilder buildTransformerChain() { // Discard the domain level core-service=management resource and its children unless RBAC is enabled // Configuring rbac details is OK (i.e. discarable), so long as the provider is not enabled ChainedTransformationDescriptionBuilder chainedBuilder = createChainFromCurrent(CoreManagementResourceDefinition.PATH_ELEMENT); ResourceTransformationDescriptionBuilder builder18To17 = createBuilder(chainedBuilder, KernelAPIVersion.VERSION_1_8, KernelAPIVersion.VERSION_1_7); builder18To17.addChildResource(AccessAuthorizationResourceDefinition.PATH_ELEMENT) .addChildResource(AccessConstraintResources.SENSITIVITY_PATH_ELEMENT) .addChildResource(SensitivityClassificationTypeResourceDefinition.PATH_ELEMENT) .discardChildResource(PathElement.pathElement(SensitivityResourceDefinition.PATH_ELEMENT.getKey(), SensitivityClassification.SERVER_SSL.getName())) .build(); ResourceTransformationDescriptionBuilder builderCurrentTo41 = createBuilderFromCurrent(chainedBuilder, KernelAPIVersion.VERSION_4_1); ResourceTransformationDescriptionBuilder childResource = builderCurrentTo41.addChildResource(AccessAuthorizationResourceDefinition.PATH_ELEMENT) .addChildResource(AccessConstraintResources.SENSITIVITY_PATH_ELEMENT) .addChildResource(SensitivityClassificationTypeResourceDefinition.PATH_ELEMENT); childResource.discardChildResource(PathElement.pathElement(SensitivityResourceDefinition.PATH_ELEMENT.getKey(), SensitivityClassification.AUTHENTICATION_CLIENT_REF.getName())).build(); childResource.discardChildResource(PathElement.pathElement(SensitivityResourceDefinition.PATH_ELEMENT.getKey(), SensitivityClassification.AUTHENTICATION_FACTORY_REF.getName())).build(); childResource.discardChildResource(PathElement.pathElement(SensitivityResourceDefinition.PATH_ELEMENT.getKey(), SensitivityClassification.ELYTRON_SECURITY_DOMAIN_REF.getName())).build(); childResource.discardChildResource(PathElement.pathElement(SensitivityResourceDefinition.PATH_ELEMENT.getKey(), SensitivityClassification.SSL_REF.getName())).build(); return chainedBuilder; } }