/* * Licensed to the Apache Software Foundation (ASF) under one * or more contributor license agreements. See the NOTICE file * distributed with this work for additional information * regarding copyright ownership. The ASF licenses this file * to you under the Apache License, Version 2.0 (the * "License"); you may not use this file except in compliance * with the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, * software distributed under the License is distributed on an * "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY * KIND, either express or implied. See the License for the * specific language governing permissions and limitations * under the License. */ package org.apache.deltaspike.security.impl.authorization; import org.apache.deltaspike.security.api.authorization.AccessDecisionState; import org.apache.deltaspike.security.api.authorization.SecurityViolation; import org.apache.deltaspike.security.spi.authorization.EditableAccessDecisionVoterContext; import javax.enterprise.context.RequestScoped; import java.util.ArrayList; import java.util.Collections; import java.util.HashMap; import java.util.List; import java.util.Map; /** * {@inheritDoc} */ @RequestScoped //TODO we might need a different scope for it public class DefaultAccessDecisionVoterContext implements EditableAccessDecisionVoterContext { private AccessDecisionState state = AccessDecisionState.INITIAL; private List<SecurityViolation> securityViolations; private Map<String, Object> metaData = new HashMap<String, Object>(); private Object source; /** * {@inheritDoc} */ @Override public AccessDecisionState getState() { return state; } /** * {@inheritDoc} */ @Override public List<SecurityViolation> getViolations() { if (securityViolations == null) { return Collections.emptyList(); } return Collections.unmodifiableList(securityViolations); } /** * {@inheritDoc} */ @Override public <T> T getSource() { return (T) source; } /** * {@inheritDoc} */ @Override public void setSource(Object source) { this.source = source; } /** * {@inheritDoc} */ @Override public Map<String, Object> getMetaData() { return Collections.unmodifiableMap(metaData); } /** * {@inheritDoc} */ @Override public <T> T getMetaDataFor(String key, Class<T> targetType) { return (T) metaData.get(key); } /** * {@inheritDoc} */ @Override public void addMetaData(String key, Object metaData) { //TODO specify nested security calls this.metaData.put(key, metaData); } /** * {@inheritDoc} */ @Override public void setState(AccessDecisionState accessDecisionVoterState) { if (AccessDecisionState.VOTE_IN_PROGRESS.equals(accessDecisionVoterState)) { securityViolations = new ArrayList<SecurityViolation>(); //lazy init } state = accessDecisionVoterState; if (AccessDecisionState.INITIAL.equals(accessDecisionVoterState) || AccessDecisionState.VOTE_IN_PROGRESS.equals(accessDecisionVoterState)) { return; } //meta-data is only needed until the end of a voting process metaData.clear(); } /** * {@inheritDoc} */ @Override public void addViolation(SecurityViolation securityViolation) { if (securityViolations == null) { throw new IllegalStateException( AccessDecisionState.VOTE_IN_PROGRESS.name() + " is required for adding security-violations"); } securityViolations.add(securityViolation); } }