| /* |
| * Licensed to the Apache Software Foundation (ASF) under one |
| * or more contributor license agreements. See the NOTICE file |
| * distributed with this work for additional information |
| * regarding copyright ownership. The ASF licenses this file |
| * to you under the Apache License, Version 2.0 (the |
| * "License"); you may not use this file except in compliance |
| * with the License. You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, |
| * software distributed under the License is distributed on an |
| * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY |
| * KIND, either express or implied. See the License for the |
| * specific language governing permissions and limitations |
| * under the License. |
| */ |
| package org.apache.shiro.mgt; |
| |
| import org.apache.shiro.authz.AuthorizationException; |
| import org.apache.shiro.authz.Authorizer; |
| import org.apache.shiro.authz.ModularRealmAuthorizer; |
| import org.apache.shiro.authz.Permission; |
| import org.apache.shiro.subject.PrincipalCollection; |
| import org.apache.shiro.lang.util.LifecycleUtils; |
| |
| import java.util.Collection; |
| import java.util.List; |
| |
| |
| /** |
| * Shiro support of a {@link SecurityManager} class hierarchy that delegates all |
| * authorization (access control) operations to a wrapped {@link Authorizer Authorizer} instance. That is, |
| * this class implements all the <tt>Authorizer</tt> methods in the {@link SecurityManager SecurityManager} |
| * interface, but in reality, those methods are merely passthrough calls to the underlying 'real' |
| * <tt>Authorizer</tt> instance. |
| * |
| * <p>All remaining <tt>SecurityManager</tt> methods not covered by this class or its parents (mostly Session support) |
| * are left to be implemented by subclasses. |
| * |
| * <p>In keeping with the other classes in this hierarchy and Shiro's desire to minimize configuration whenever |
| * possible, suitable default instances for all dependencies will be created upon instantiation. |
| * |
| * @since 0.9 |
| */ |
| public abstract class AuthorizingSecurityManager extends AuthenticatingSecurityManager { |
| |
| /** |
| * The wrapped instance to which all of this <tt>SecurityManager</tt> authorization calls are delegated. |
| */ |
| private Authorizer authorizer; |
| |
| /** |
| * Default no-arg constructor that initializes an internal default |
| * {@link org.apache.shiro.authz.ModularRealmAuthorizer ModularRealmAuthorizer}. |
| */ |
| public AuthorizingSecurityManager() { |
| super(); |
| this.authorizer = new ModularRealmAuthorizer(); |
| } |
| |
| /** |
| * Returns the underlying wrapped <tt>Authorizer</tt> instance to which this <tt>SecurityManager</tt> |
| * implementation delegates all of its authorization calls. |
| * |
| * @return the wrapped <tt>Authorizer</tt> used by this <tt>SecurityManager</tt> implementation. |
| */ |
| public Authorizer getAuthorizer() { |
| return authorizer; |
| } |
| |
| /** |
| * Sets the underlying <tt>Authorizer</tt> instance to which this <tt>SecurityManager</tt> implementation will |
| * delegate all of its authorization calls. |
| * |
| * @param authorizer the <tt>Authorizer</tt> this <tt>SecurityManager</tt> should wrap and delegate all of its |
| * authorization calls to. |
| */ |
| public void setAuthorizer(Authorizer authorizer) { |
| if (authorizer == null) { |
| String msg = "Authorizer argument cannot be null."; |
| throw new IllegalArgumentException(msg); |
| } |
| this.authorizer = authorizer; |
| } |
| |
| /** |
| * First calls <code>super.afterRealmsSet()</code> and then sets these same <code>Realm</code> objects on this |
| * instance's wrapped {@link Authorizer Authorizer}. |
| * <p/> |
| * The setting of realms the Authorizer will only occur if it is an instance of |
| * {@link org.apache.shiro.authz.ModularRealmAuthorizer ModularRealmAuthorizer}, that is: |
| * <pre> |
| * if ( this.authorizer instanceof ModularRealmAuthorizer ) { |
| * ((ModularRealmAuthorizer)this.authorizer).setRealms(realms); |
| * }</pre> |
| */ |
| protected void afterRealmsSet() { |
| super.afterRealmsSet(); |
| if (this.authorizer instanceof ModularRealmAuthorizer) { |
| ((ModularRealmAuthorizer) this.authorizer).setRealms(getRealms()); |
| } |
| } |
| |
| public void destroy() { |
| LifecycleUtils.destroy(getAuthorizer()); |
| this.authorizer = null; |
| super.destroy(); |
| } |
| |
| public boolean isPermitted(PrincipalCollection principals, String permissionString) { |
| return this.authorizer.isPermitted(principals, permissionString); |
| } |
| |
| public boolean isPermitted(PrincipalCollection principals, Permission permission) { |
| return this.authorizer.isPermitted(principals, permission); |
| } |
| |
| public boolean[] isPermitted(PrincipalCollection principals, String... permissions) { |
| return this.authorizer.isPermitted(principals, permissions); |
| } |
| |
| public boolean[] isPermitted(PrincipalCollection principals, List<Permission> permissions) { |
| return this.authorizer.isPermitted(principals, permissions); |
| } |
| |
| public boolean isPermittedAll(PrincipalCollection principals, String... permissions) { |
| return this.authorizer.isPermittedAll(principals, permissions); |
| } |
| |
| public boolean isPermittedAll(PrincipalCollection principals, Collection<Permission> permissions) { |
| return this.authorizer.isPermittedAll(principals, permissions); |
| } |
| |
| public void checkPermission(PrincipalCollection principals, String permission) throws AuthorizationException { |
| this.authorizer.checkPermission(principals, permission); |
| } |
| |
| public void checkPermission(PrincipalCollection principals, Permission permission) throws AuthorizationException { |
| this.authorizer.checkPermission(principals, permission); |
| } |
| |
| public void checkPermissions(PrincipalCollection principals, String... permissions) throws AuthorizationException { |
| this.authorizer.checkPermissions(principals, permissions); |
| } |
| |
| public void checkPermissions(PrincipalCollection principals, Collection<Permission> permissions) |
| throws AuthorizationException { |
| this.authorizer.checkPermissions(principals, permissions); |
| } |
| |
| public boolean hasRole(PrincipalCollection principals, String roleIdentifier) { |
| return this.authorizer.hasRole(principals, roleIdentifier); |
| } |
| |
| public boolean[] hasRoles(PrincipalCollection principals, List<String> roleIdentifiers) { |
| return this.authorizer.hasRoles(principals, roleIdentifiers); |
| } |
| |
| public boolean hasAllRoles(PrincipalCollection principals, Collection<String> roleIdentifiers) { |
| return this.authorizer.hasAllRoles(principals, roleIdentifiers); |
| } |
| |
| public void checkRole(PrincipalCollection principals, String role) throws AuthorizationException { |
| this.authorizer.checkRole(principals, role); |
| } |
| |
| public void checkRoles(PrincipalCollection principals, Collection<String> roles) throws AuthorizationException { |
| this.authorizer.checkRoles(principals, roles); |
| } |
| |
| public void checkRoles(PrincipalCollection principals, String... roles) throws AuthorizationException { |
| this.authorizer.checkRoles(principals, roles); |
| } |
| |
| } |