Skip to main content
aboutsummaryrefslogtreecommitdiffstats
blob: 01354349389a78df423257dcb8b808f74c705732 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
/*******************************************************************************
 * Copyright (c) 2010-2019 BSI Business Systems Integration AG.
 * All rights reserved. This program and the accompanying materials
 * are made available under the terms of the Eclipse Public License v1.0
 * which accompanies this distribution, and is available at
 * http://www.eclipse.org/legal/epl-v10.html
 *
 * Contributors:
 *     BSI Business Systems Integration AG - initial API and implementation
 ******************************************************************************/
package org.eclipse.scout.rt.security;

import java.security.Permission;
import java.util.ArrayList;
import java.util.Collection;
import java.util.Collections;
import java.util.Enumeration;
import java.util.HashMap;
import java.util.List;
import java.util.Map;
import java.util.Set;
import java.util.stream.Collectors;
import java.util.stream.Stream;

import org.eclipse.scout.rt.platform.util.Assertions;
import org.eclipse.scout.rt.platform.util.EnumerationUtility;

/**
 * Default implementation of an permission collection implementing {@link IPermissionCollection}.
 * <p>
 * Unlike other permission collections, this implementation utilize the fact than an {@link IPermission} can only be
 * implied by another {@link IPermission} with the same name.
 */
public class DefaultPermissionCollection extends AbstractPermissionCollection {
  private static final long serialVersionUID = 1L;

  /** content is effective immutable and protected by {@link #isReadOnly()} */
  private final Map<String, List<IPermission>> m_permissions;
  private final List<Permission> m_javaPermissions;

  public DefaultPermissionCollection() {
    m_permissions = new HashMap<>();
    m_javaPermissions = new ArrayList<>();
  }

  @Override
  public void add(Permission permission) {
    assertNotReadOnly();
    if (permission instanceof IPermission) {
      add((IPermission) permission);
    }
    else if (permission != null) {
      m_javaPermissions.add(permission);
    }
  }

  @Override
  public void add(IPermission permission) {
    assertNotReadOnly();
    m_permissions.computeIfAbsent(permission.getName(), k -> new ArrayList<>()).add((IPermission) permission);
  }

  protected void assertNotReadOnly() {
    Assertions.assertFalse(isReadOnly(), "PermissionCollection is read-only");
  }

  @Override
  public void setReadOnly() {
    super.setReadOnly();
    assignPermissionCollectionInternal();
  }

  protected void assignPermissionCollectionInternal() {
    m_permissions.values().stream()
        .flatMap(Collection::stream)
        .forEach(p -> p.assignPermissionCollection(this));
  }

  @Override
  public boolean implies(Permission permission) {
    if (permission == null) {
      return false;
    }
    else if (permission instanceof IPermission) {
      return implies((IPermission) permission);
    }
    else {
      return m_javaPermissions.stream().anyMatch(def -> def.implies(permission));
    }
  }

  @Override
  public boolean implies(IPermission permission) {
    if (permission == null) {
      return false;
    }
    return m_permissions.getOrDefault(permission.getName(), Collections.emptyList()).stream().anyMatch(def -> def.implies(permission));
  }

  @Override
  public PermissionLevel getGrantedPermissionLevel(IPermission permission) {
    if (permission == null) {
      return PermissionLevel.UNDEFINED;
    }

    Set<PermissionLevel> grantedLevels = stream(permission)
        .map(IPermission::getLevel)
        .collect(Collectors.toSet());

    switch (grantedLevels.size()) {
      case 0:
        return PermissionLevel.NONE; // no such permission was granted
      case 1:
        return grantedLevels.iterator().next();
      default:
        return PermissionLevel.UNDEFINED; // there are multiple permissions matching - concrete level depends on a data
    }
  }

  @Override
  public Stream<IPermission> stream() {
    return m_permissions.values().stream().flatMap(Collection::stream);
  }

  @Override
  public Stream<IPermission> stream(IPermission permission) {
    if (permission == null) {
      return Stream.empty();
    }
    return m_permissions.getOrDefault(permission.getName(), Collections.emptyList()).stream()
        .filter(def -> def.matches(permission));
  }

  @Override
  public Enumeration<Permission> elements() {
    return EnumerationUtility.asEnumeration(
        Stream.concat(stream().map(Permission.class::cast), m_javaPermissions.stream()).iterator());
  }
}

Back to the top