/*
* #%L
* FlatPack Demonstration Server
* %%
* Copyright (C) 2012 Perka Inc.
* %%
* Licensed under the Apache License, Version 2.0 (the "License");
* you may not use this file except in compliance with the License.
* You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
* #L%
*/
package com.getperka.flatpack.demo.server;
import java.security.Principal;
import java.util.Collections;
import java.util.List;
import com.getperka.flatpack.HasUuid;
import com.getperka.flatpack.security.PrincipalMapper;
import com.getperka.flatpack.security.SecurityTarget;
public class DemoPrincipalMapper implements PrincipalMapper {
@Override
public List<String> getGlobalSecurityGroups(Principal principal) {
return Collections.singletonList(((DummyPrincipal) principal).getRole());
}
/**
* If your Principals are derived from model object (e.g. users are stored as entities) or
* specific entities should be editable by specific principals, this method can be used to provide
* a mapping from the entity to identities.
*/
@Override
public List<Principal> getPrincipals(HasUuid entity) {
return Collections.emptyList();
}
/**
* This allows accesses to be disabled for certain classes of users or entities. Simple examples
* include application super-users, however it may be desirable to have certain entities that are
* mutable for a period of time and then sealed.
*/
@Override
public boolean isAccessEnforced(Principal principal, SecurityTarget target) {
return !Roles.ADMIN.equals(((DummyPrincipal) principal).getRole());
}
}