| /* |
| * Licensed to the Apache Software Foundation (ASF) under one |
| * or more contributor license agreements. See the NOTICE file |
| * distributed with this work for additional information |
| * regarding copyright ownership. The ASF licenses this file |
| * to you under the Apache License, Version 2.0 (the |
| * "License"); you may not use this file except in compliance |
| * with the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, |
| * software distributed under the License is distributed on an |
| * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY |
| * KIND, either express or implied. See the License for the |
| * specific language governing permissions and limitations |
| * under the License. |
| */ |
| package org.apache.shiro.mgt; |
| |
| import org.apache.shiro.authc.*; |
| import org.apache.shiro.authz.Authorizer; |
| import org.apache.shiro.realm.Realm; |
| import org.apache.shiro.session.InvalidSessionException; |
| import org.apache.shiro.session.Session; |
| import org.apache.shiro.session.mgt.DefaultSessionContext; |
| import org.apache.shiro.session.mgt.DefaultSessionKey; |
| import org.apache.shiro.session.mgt.SessionContext; |
| import org.apache.shiro.session.mgt.SessionKey; |
| import org.apache.shiro.subject.PrincipalCollection; |
| import org.apache.shiro.subject.Subject; |
| import org.apache.shiro.subject.SubjectContext; |
| import org.apache.shiro.subject.support.DefaultSubjectContext; |
| import org.apache.shiro.util.CollectionUtils; |
| import org.slf4j.Logger; |
| import org.slf4j.LoggerFactory; |
| |
| import java.io.Serializable; |
| import java.util.Collection; |
| |
| /** |
| * The Shiro framework's default concrete implementation of the {@link SecurityManager} interface, |
| * based around a collection of {@link org.apache.shiro.realm.Realm}s. This implementation delegates its |
| * authentication, authorization, and session operations to wrapped {@link Authenticator}, {@link Authorizer}, and |
| * {@link org.apache.shiro.session.mgt.SessionManager SessionManager} instances respectively via superclass |
| * implementation. |
| * <p/> |
| * To greatly reduce and simplify configuration, this implementation (and its superclasses) will |
| * create suitable defaults for all of its required dependencies, <em>except</em> the required one or more |
| * {@link Realm Realm}s. Because {@code Realm} implementations usually interact with an application's data model, |
| * they are almost always application specific; you will want to specify at least one custom |
| * {@code Realm} implementation that 'knows' about your application's data/security model |
| * (via {@link #setRealm} or one of the overloaded constructors). All other attributes in this class hierarchy |
| * will have suitable defaults for most enterprise applications. |
| * <p/> |
| * <b>RememberMe notice</b>: This class supports the ability to configure a |
| * {@link #setRememberMeManager RememberMeManager} |
| * for {@code RememberMe} identity services for login/logout, BUT, a default instance <em>will not</em> be created |
| * for this attribute at startup. |
| * <p/> |
| * Because RememberMe services are inherently client tier-specific and |
| * therefore aplication-dependent, if you want {@code RememberMe} services enabled, you will have to specify an |
| * instance yourself via the {@link #setRememberMeManager(RememberMeManager) setRememberMeManager} |
| * mutator. However if you're reading this JavaDoc with the |
| * expectation of operating in a Web environment, take a look at the |
| * {@code org.apache.shiro.web.DefaultWebSecurityManager} implementation, which |
| * <em>does</em> support {@code RememberMe} services by default at startup. |
| * |
| * @since 0.2 |
| */ |
| public class DefaultSecurityManager extends SessionsSecurityManager { |
| |
| private static final Logger log = LoggerFactory.getLogger(DefaultSecurityManager.class); |
| |
| protected RememberMeManager rememberMeManager; |
| protected SubjectDAO subjectDAO; |
| protected SubjectFactory subjectFactory; |
| |
| /** |
| * Default no-arg constructor. |
| */ |
| public DefaultSecurityManager() { |
| super(); |
| this.subjectFactory = new DefaultSubjectFactory(); |
| this.subjectDAO = new DefaultSubjectDAO(); |
| } |
| |
| /** |
| * Supporting constructor for a single-realm application. |
| * |
| * @param singleRealm the single realm used by this SecurityManager. |
| */ |
| public DefaultSecurityManager(Realm singleRealm) { |
| this(); |
| setRealm(singleRealm); |
| } |
| |
| /** |
| * Supporting constructor for multiple {@link #setRealms realms}. |
| * |
| * @param realms the realm instances backing this SecurityManager. |
| */ |
| public DefaultSecurityManager(Collection<Realm> realms) { |
| this(); |
| setRealms(realms); |
| } |
| |
| /** |
| * Returns the {@code SubjectFactory} responsible for creating {@link Subject} instances exposed to the application. |
| * |
| * @return the {@code SubjectFactory} responsible for creating {@link Subject} instances exposed to the application. |
| */ |
| public SubjectFactory getSubjectFactory() { |
| return subjectFactory; |
| } |
| |
| /** |
| * Sets the {@code SubjectFactory} responsible for creating {@link Subject} instances exposed to the application. |
| * |
| * @param subjectFactory the {@code SubjectFactory} responsible for creating {@link Subject} instances exposed to the application. |
| */ |
| public void setSubjectFactory(SubjectFactory subjectFactory) { |
| this.subjectFactory = subjectFactory; |
| } |
| |
| /** |
| * Returns the {@code SubjectDAO} responsible for persisting Subject state, typically used after login or when an |
| * Subject identity is discovered (eg after RememberMe services). Unless configured otherwise, the default |
| * implementation is a {@link DefaultSubjectDAO}. |
| * |
| * @return the {@code SubjectDAO} responsible for persisting Subject state, typically used after login or when an |
| * Subject identity is discovered (eg after RememberMe services). |
| * @see DefaultSubjectDAO |
| * @since 1.2 |
| */ |
| public SubjectDAO getSubjectDAO() { |
| return subjectDAO; |
| } |
| |
| /** |
| * Sets the {@code SubjectDAO} responsible for persisting Subject state, typically used after login or when an |
| * Subject identity is discovered (eg after RememberMe services). Unless configured otherwise, the default |
| * implementation is a {@link DefaultSubjectDAO}. |
| * |
| * @param subjectDAO the {@code SubjectDAO} responsible for persisting Subject state, typically used after login or when an |
| * Subject identity is discovered (eg after RememberMe services). |
| * @see DefaultSubjectDAO |
| * @since 1.2 |
| */ |
| public void setSubjectDAO(SubjectDAO subjectDAO) { |
| this.subjectDAO = subjectDAO; |
| } |
| |
| public RememberMeManager getRememberMeManager() { |
| return rememberMeManager; |
| } |
| |
| public void setRememberMeManager(RememberMeManager rememberMeManager) { |
| this.rememberMeManager = rememberMeManager; |
| } |
| |
| protected SubjectContext createSubjectContext() { |
| return new DefaultSubjectContext(); |
| } |
| |
| /** |
| * Creates a {@code Subject} instance for the user represented by the given method arguments. |
| * |
| * @param token the {@code AuthenticationToken} submitted for the successful authentication. |
| * @param info the {@code AuthenticationInfo} of a newly authenticated user. |
| * @param existing the existing {@code Subject} instance that initiated the authentication attempt |
| * @return the {@code Subject} instance that represents the context and session data for the newly |
| * authenticated subject. |
| */ |
| protected Subject createSubject(AuthenticationToken token, AuthenticationInfo info, Subject existing) { |
| SubjectContext context = createSubjectContext(); |
| context.setAuthenticated(true); |
| context.setAuthenticationToken(token); |
| context.setAuthenticationInfo(info); |
| if (existing != null) { |
| context.setSubject(existing); |
| } |
| return createSubject(context); |
| } |
| |
| /** |
| * Binds a {@code Subject} instance created after authentication to the application for later use. |
| * <p/> |
| * As of Shiro 1.2, this method has been deprecated in favor of {@link #save(org.apache.shiro.subject.Subject)}, |
| * which this implementation now calls. |
| * |
| * @param subject the {@code Subject} instance created after authentication to be bound to the application |
| * for later use. |
| * @see #save(org.apache.shiro.subject.Subject) |
| * @deprecated in favor of {@link #save(org.apache.shiro.subject.Subject) save(subject)}. |
| */ |
| @Deprecated |
| protected void bind(Subject subject) { |
| save(subject); |
| } |
| |
| protected void rememberMeSuccessfulLogin(AuthenticationToken token, AuthenticationInfo info, Subject subject) { |
| RememberMeManager rmm = getRememberMeManager(); |
| if (rmm != null) { |
| try { |
| rmm.onSuccessfulLogin(subject, token, info); |
| } catch (Exception e) { |
| if (log.isWarnEnabled()) { |
| String msg = "Delegate RememberMeManager instance of type [" + rmm.getClass().getName() + |
| "] threw an exception during onSuccessfulLogin. RememberMe services will not be " + |
| "performed for account [" + info + "]."; |
| log.warn(msg, e); |
| } |
| } |
| } else { |
| if (log.isTraceEnabled()) { |
| log.trace("This " + getClass().getName() + " instance does not have a " + |
| "[" + RememberMeManager.class.getName() + "] instance configured. RememberMe services " + |
| "will not be performed for account [" + info + "]."); |
| } |
| } |
| } |
| |
| protected void rememberMeFailedLogin(AuthenticationToken token, AuthenticationException ex, Subject subject) { |
| RememberMeManager rmm = getRememberMeManager(); |
| if (rmm != null) { |
| try { |
| rmm.onFailedLogin(subject, token, ex); |
| } catch (Exception e) { |
| if (log.isWarnEnabled()) { |
| String msg = "Delegate RememberMeManager instance of type [" + rmm.getClass().getName() + |
| "] threw an exception during onFailedLogin for AuthenticationToken [" + |
| token + "]."; |
| log.warn(msg, e); |
| } |
| } |
| } |
| } |
| |
| protected void rememberMeLogout(Subject subject) { |
| RememberMeManager rmm = getRememberMeManager(); |
| if (rmm != null) { |
| try { |
| rmm.onLogout(subject); |
| } catch (Exception e) { |
| if (log.isWarnEnabled()) { |
| String msg = "Delegate RememberMeManager instance of type [" + rmm.getClass().getName() + |
| "] threw an exception during onLogout for subject with principals [" + |
| (subject != null ? subject.getPrincipals() : null) + "]"; |
| log.warn(msg, e); |
| } |
| } |
| } |
| } |
| |
| /** |
| * First authenticates the {@code AuthenticationToken} argument, and if successful, constructs a |
| * {@code Subject} instance representing the authenticated account's identity. |
| * <p/> |
| * Once constructed, the {@code Subject} instance is then {@link #bind bound} to the application for |
| * subsequent access before being returned to the caller. |
| * |
| * @param token the authenticationToken to process for the login attempt. |
| * @return a Subject representing the authenticated user. |
| * @throws AuthenticationException if there is a problem authenticating the specified {@code token}. |
| */ |
| public Subject login(Subject subject, AuthenticationToken token) throws AuthenticationException { |
| AuthenticationInfo info; |
| try { |
| info = authenticate(token); |
| } catch (AuthenticationException ae) { |
| try { |
| onFailedLogin(token, ae, subject); |
| } catch (Exception e) { |
| if (log.isInfoEnabled()) { |
| log.info("onFailedLogin method threw an " + |
| "exception. Logging and propagating original AuthenticationException.", e); |
| } |
| } |
| throw ae; //propagate |
| } |
| |
| Subject loggedIn = createSubject(token, info, subject); |
| |
| onSuccessfulLogin(token, info, loggedIn); |
| |
| return loggedIn; |
| } |
| |
| protected void onSuccessfulLogin(AuthenticationToken token, AuthenticationInfo info, Subject subject) { |
| rememberMeSuccessfulLogin(token, info, subject); |
| } |
| |
| protected void onFailedLogin(AuthenticationToken token, AuthenticationException ae, Subject subject) { |
| rememberMeFailedLogin(token, ae, subject); |
| } |
| |
| protected void beforeLogout(Subject subject) { |
| rememberMeLogout(subject); |
| } |
| |
| protected SubjectContext copy(SubjectContext subjectContext) { |
| return new DefaultSubjectContext(subjectContext); |
| } |
| |
| /** |
| * This implementation functions as follows: |
| * <p/> |
| * <ol> |
| * <li>Ensures the {@code SubjectContext} is as populated as it can be, using heuristics to acquire |
| * data that may not have already been available to it (such as a referenced session or remembered principals).</li> |
| * <li>Calls {@link #doCreateSubject(org.apache.shiro.subject.SubjectContext)} to actually perform the |
| * {@code Subject} instance creation.</li> |
| * <li>calls {@link #save(org.apache.shiro.subject.Subject) save(subject)} to ensure the constructed |
| * {@code Subject}'s state is accessible for future requests/invocations if necessary.</li> |
| * <li>returns the constructed {@code Subject} instance.</li> |
| * </ol> |
| * |
| * @param subjectContext any data needed to direct how the Subject should be constructed. |
| * @return the {@code Subject} instance reflecting the specified contextual data. |
| * @see #ensureSecurityManager(org.apache.shiro.subject.SubjectContext) |
| * @see #resolveSession(org.apache.shiro.subject.SubjectContext) |
| * @see #resolvePrincipals(org.apache.shiro.subject.SubjectContext) |
| * @see #doCreateSubject(org.apache.shiro.subject.SubjectContext) |
| * @see #save(org.apache.shiro.subject.Subject) |
| * @since 1.0 |
| */ |
| public Subject createSubject(SubjectContext subjectContext) { |
| //create a copy so we don't modify the argument's backing map: |
| SubjectContext context = copy(subjectContext); |
| |
| //ensure that the context has a SecurityManager instance, and if not, add one: |
| context = ensureSecurityManager(context); |
| |
| //Resolve an associated Session (usually based on a referenced session ID), and place it in the context before |
| //sending to the SubjectFactory. The SubjectFactory should not need to know how to acquire sessions as the |
| //process is often environment specific - better to shield the SF from these details: |
| context = resolveSession(context); |
| |
| //Similarly, the SubjectFactory should not require any concept of RememberMe - translate that here first |
| //if possible before handing off to the SubjectFactory: |
| context = resolvePrincipals(context); |
| |
| Subject subject = doCreateSubject(context); |
| |
| //save this subject for future reference if necessary: |
| //(this is needed here in case rememberMe principals were resolved and they need to be stored in the |
| //session, so we don't constantly rehydrate the rememberMe PrincipalCollection on every operation). |
| //Added in 1.2: |
| save(subject); |
| |
| return subject; |
| } |
| |
| /** |
| * Actually creates a {@code Subject} instance by delegating to the internal |
| * {@link #getSubjectFactory() subjectFactory}. By the time this method is invoked, all possible |
| * {@code SubjectContext} data (session, principals, et. al.) has been made accessible using all known heuristics |
| * and will be accessible to the {@code subjectFactory} via the {@code subjectContext.resolve*} methods. |
| * |
| * @param context the populated context (data map) to be used by the {@code SubjectFactory} when creating a |
| * {@code Subject} instance. |
| * @return a {@code Subject} instance reflecting the data in the specified {@code SubjectContext} data map. |
| * @see #getSubjectFactory() |
| * @see SubjectFactory#createSubject(org.apache.shiro.subject.SubjectContext) |
| * @since 1.2 |
| */ |
| protected Subject doCreateSubject(SubjectContext context) { |
| return getSubjectFactory().createSubject(context); |
| } |
| |
| /** |
| * Saves the subject's state to a persistent location for future reference if necessary. |
| * <p/> |
| * This implementation merely delegates to the internal {@link #setSubjectDAO(SubjectDAO) subjectDAO} and calls |
| * {@link SubjectDAO#save(org.apache.shiro.subject.Subject) subjectDAO.save(subject)}. |
| * |
| * @param subject the subject for which state will potentially be persisted |
| * @see SubjectDAO#save(org.apache.shiro.subject.Subject) |
| * @since 1.2 |
| */ |
| protected void save(Subject subject) { |
| this.subjectDAO.save(subject); |
| } |
| |
| /** |
| * Removes (or 'unbinds') the Subject's state from the application, typically called during {@link #logout}.. |
| * <p/> |
| * This implementation merely delegates to the internal {@link #setSubjectDAO(SubjectDAO) subjectDAO} and calls |
| * {@link SubjectDAO#delete(org.apache.shiro.subject.Subject) delete(subject)}. |
| * |
| * @param subject the subject for which state will be removed |
| * @see SubjectDAO#delete(org.apache.shiro.subject.Subject) |
| * @since 1.2 |
| */ |
| protected void delete(Subject subject) { |
| this.subjectDAO.delete(subject); |
| } |
| |
| /** |
| * Determines if there is a {@code SecurityManager} instance in the context, and if not, adds 'this' to the |
| * context. This ensures the SubjectFactory instance will have access to a SecurityManager during Subject |
| * construction if necessary. |
| * |
| * @param context the subject context data that may contain a SecurityManager instance. |
| * @return The SubjectContext to use to pass to a {@link SubjectFactory} for subject creation. |
| * @since 1.0 |
| */ |
| @SuppressWarnings({"unchecked"}) |
| protected SubjectContext ensureSecurityManager(SubjectContext context) { |
| if (context.resolveSecurityManager() != null) { |
| log.trace("Context already contains a SecurityManager instance. Returning."); |
| return context; |
| } |
| log.trace("No SecurityManager found in context. Adding self reference."); |
| context.setSecurityManager(this); |
| return context; |
| } |
| |
| /** |
| * Attempts to resolve any associated session based on the context and returns a |
| * context that represents this resolved {@code Session} to ensure it may be referenced if necessary by the |
| * invoked {@link SubjectFactory} that performs actual {@link Subject} construction. |
| * <p/> |
| * If there is a {@code Session} already in the context because that is what the caller wants to be used for |
| * {@code Subject} construction, or if no session is resolved, this method effectively does nothing |
| * returns the context method argument unaltered. |
| * |
| * @param context the subject context data that may resolve a Session instance. |
| * @return The context to use to pass to a {@link SubjectFactory} for subject creation. |
| * @since 1.0 |
| */ |
| @SuppressWarnings({"unchecked"}) |
| protected SubjectContext resolveSession(SubjectContext context) { |
| if (context.resolveSession() != null) { |
| log.debug("Context already contains a session. Returning."); |
| return context; |
| } |
| try { |
| //Context couldn't resolve it directly, let's see if we can since we have direct access to |
| //the session manager: |
| Session session = resolveContextSession(context); |
| if (session != null) { |
| context.setSession(session); |
| } |
| } catch (InvalidSessionException e) { |
| log.debug("Resolved SubjectContext context session is invalid. Ignoring and creating an anonymous " + |
| "(session-less) Subject instance.", e); |
| } |
| return context; |
| } |
| |
| protected Session resolveContextSession(SubjectContext context) throws InvalidSessionException { |
| SessionKey key = getSessionKey(context); |
| if (key != null) { |
| return getSession(key); |
| } |
| return null; |
| } |
| |
| protected SessionKey getSessionKey(SubjectContext context) { |
| DefaultSessionKey sessionKey = null; |
| Serializable sessionId = context.getSessionId(); |
| if (sessionId != null) { |
| sessionKey = new DefaultSessionKey(sessionId); |
| } |
| if (sessionKey != null) { |
| sessionKey.setUpdateDeferred(context.isSessionUpdateDeferred()); |
| } |
| return null; |
| } |
| |
| /** |
| * Attempts to resolve an identity (a {@link PrincipalCollection}) for the context using heuristics. This |
| * implementation functions as follows: |
| * <ol> |
| * <li>Check the context to see if it can already {@link SubjectContext#resolvePrincipals resolve an identity}. If |
| * so, this method does nothing and returns the method argument unaltered.</li> |
| * <li>Check for a RememberMe identity by calling {@link #getRememberedIdentity}. If that method returns a |
| * non-null value, place the remembered {@link PrincipalCollection} in the context.</li> |
| * </ol> |
| * |
| * @param context the subject context data that may provide (directly or indirectly through one of its values) a |
| * {@link PrincipalCollection} identity. |
| * @return The Subject context to use to pass to a {@link SubjectFactory} for subject creation. |
| * @since 1.0 |
| */ |
| @SuppressWarnings({"unchecked"}) |
| protected SubjectContext resolvePrincipals(SubjectContext context) { |
| |
| PrincipalCollection principals = context.resolvePrincipals(); |
| |
| if (CollectionUtils.isEmpty(principals)) { |
| log.trace("No identity (PrincipalCollection) found in the context. Looking for a remembered identity."); |
| |
| principals = getRememberedIdentity(context); |
| |
| if (!CollectionUtils.isEmpty(principals)) { |
| log.debug("Found remembered PrincipalCollection. Adding to the context to be used " + |
| "for subject construction by the SubjectFactory."); |
| |
| context.setPrincipals(principals); |
| |
| // The following call was removed (commented out) in Shiro 1.2 because it uses the session as an |
| // implementation strategy. Session use for Shiro's own needs should be controlled in a single place |
| // to be more manageable for end-users: there are a number of stateless (e.g. REST) applications that |
| // use Shiro that need to ensure that sessions are only used when desirable. If Shiro's internal |
| // implementations used Subject sessions (setting attributes) whenever we wanted, it would be much |
| // harder for end-users to control when/where that occurs. |
| // |
| // Because of this, the SubjectDAO was created as the single point of control, and session state logic |
| // has been moved to the DefaultSubjectDAO implementation. |
| |
| // Removed in Shiro 1.2. SHIRO-157 is still satisfied by the new DefaultSubjectDAO implementation |
| // introduced in 1.2 |
| // Satisfies SHIRO-157: |
| // bindPrincipalsToSession(principals, context); |
| |
| } else { |
| log.trace("No remembered identity found. Returning original context."); |
| } |
| } |
| |
| return context; |
| } |
| |
| protected SessionContext createSessionContext(SubjectContext subjectContext) { |
| DefaultSessionContext sessionContext = new DefaultSessionContext(); |
| if (!CollectionUtils.isEmpty(subjectContext)) { |
| sessionContext.putAll(subjectContext); |
| } |
| Serializable sessionId = subjectContext.getSessionId(); |
| if (sessionId != null) { |
| sessionContext.setSessionId(sessionId); |
| } |
| String host = subjectContext.resolveHost(); |
| if (host != null) { |
| sessionContext.setHost(host); |
| } |
| return sessionContext; |
| } |
| |
| public void logout(Subject subject) { |
| |
| if (subject == null) { |
| throw new IllegalArgumentException("Subject method argument cannot be null."); |
| } |
| |
| beforeLogout(subject); |
| |
| PrincipalCollection principals = subject.getPrincipals(); |
| if (principals != null && !principals.isEmpty()) { |
| if (log.isDebugEnabled()) { |
| log.debug("Logging out subject with primary principal {}", principals.getPrimaryPrincipal()); |
| } |
| Authenticator authc = getAuthenticator(); |
| if (authc instanceof LogoutAware) { |
| ((LogoutAware) authc).onLogout(principals); |
| } |
| } |
| |
| try { |
| delete(subject); |
| } catch (Exception e) { |
| if (log.isDebugEnabled()) { |
| String msg = "Unable to cleanly unbind Subject. Ignoring (logging out)."; |
| log.debug(msg, e); |
| } |
| } finally { |
| try { |
| stopSession(subject); |
| } catch (Exception e) { |
| if (log.isDebugEnabled()) { |
| String msg = "Unable to cleanly stop Session for Subject [" + subject.getPrincipal() + "] " + |
| "Ignoring (logging out)."; |
| log.debug(msg, e); |
| } |
| } |
| } |
| } |
| |
| protected void stopSession(Subject subject) { |
| Session s = subject.getSession(false); |
| if (s != null) { |
| s.stop(); |
| } |
| } |
| |
| /** |
| * Unbinds or removes the Subject's state from the application, typically called during {@link #logout}. |
| * <p/> |
| * This has been deprecated in Shiro 1.2 in favor of the {@link #delete(org.apache.shiro.subject.Subject) delete} |
| * method. The implementation has been updated to invoke that method. |
| * |
| * @param subject the subject to unbind from the application as it will no longer be used. |
| * @deprecated in Shiro 1.2 in favor of {@link #delete(org.apache.shiro.subject.Subject)} |
| */ |
| @Deprecated |
| @SuppressWarnings({"UnusedDeclaration"}) |
| protected void unbind(Subject subject) { |
| delete(subject); |
| } |
| |
| protected PrincipalCollection getRememberedIdentity(SubjectContext subjectContext) { |
| RememberMeManager rmm = getRememberMeManager(); |
| if (rmm != null) { |
| try { |
| return rmm.getRememberedPrincipals(subjectContext); |
| } catch (Exception e) { |
| if (log.isWarnEnabled()) { |
| String msg = "Delegate RememberMeManager instance of type [" + rmm.getClass().getName() + |
| "] threw an exception during getRememberedPrincipals()."; |
| log.warn(msg, e); |
| } |
| } |
| } |
| return null; |
| } |
| } |