/*
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing, software
* distributed under the License is distributed on an "AS IS" BASIS,
* WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
* See the License for the specific language governing permissions and
* limitations under the License.
*/
package net.jini.discovery;
import java.security.Permission;
import java.security.PermissionCollection;
import java.util.Enumeration;
import java.util.ArrayList;
import java.util.Collections;
/**
* Permission for using LookupDiscovery. The permission contains a name
* but no actions list. The name is a discovery group name. The empty
* string represents the "public" group (as usual). The name "*" represents
* all groups. The name can start with "*." to signify a prefix wildcard
* match; in this case, group names are assumed to be in dotted domain name
* style (e.g., "*.sun.com").
* <p>
* Note that, due to limitations of the Java(TM) platform security model,
* permission must be granted not only to the code that calls LookupDiscovery,
* but also to LookupDiscovery itself.
*
* @author Sun Microsystems, Inc.
*
* @see LookupDiscovery
*/
public final class DiscoveryPermission extends Permission
implements java.io.Serializable
{
private static final long serialVersionUID = -3036978025008149170L;
/**
* Simple constructor.
*
* @param group the group name (wildcard permitted)
*/
public DiscoveryPermission(String group) {
super(group == null ? "" : group);
if (group == null)
group = "";
else if (group.startsWith("*") &&
!(group.length() == 1 ||
(group.length() > 2 && group.startsWith("*."))))
throw new IllegalArgumentException(
"invalid group wildcard specification");
}
/**
* Simple constructor.
*
* @param group the group name (wildcard permitted)
* @param action ignored
*/
public DiscoveryPermission(String group, String action) {
this(group);
}
/**
* Returns true if the name of this permission (the one on which
* the method is invoked) is the same as the name of the
* permission parameter, or if the name of this permission starts
* with '*' and the remainder (after the '*') is a suffix of the
* name of the permission parameter.
*/
public boolean implies(Permission p) {
if (!(p instanceof DiscoveryPermission))
return false;
String grp = p.getName();
String group = getName();
if (group.startsWith("*")) {
if (group.length() == 1)
return true;
if (grp.length() == 1)
return false;
return (grp.length() >= group.length() &&
group.regionMatches(false, 2, grp,
grp.length() - group.length() + 2,
group.length() - 2));
}
if (grp.startsWith("*"))
return false;
return group.equals(grp);
}
/** Two instances are equal if they have the same name. */
public boolean equals(Object obj) {
return (this == obj ||
(obj instanceof DiscoveryPermission &&
getName().equals(((DiscoveryPermission)obj).getName())));
}
public int hashCode() {
return getName().hashCode();
}
/**
* Always returns the empty string; this permission type has no actions
* list.
*/
public String getActions() {
return "";
}
// inherits javadoc
public PermissionCollection newPermissionCollection() {
/* default permission collection is inadequate (bug 4158302) */
return new Collection();
}
/** Simple permission collection */
private static class Collection extends PermissionCollection {
private static final long serialVersionUID = -6656227831159479611L;
/**
* Permissions
*
* @serial
**/
private final ArrayList perms = new ArrayList(3);
public synchronized void add(Permission p) {
if (isReadOnly())
throw new SecurityException("collection is read-only");
if (perms.indexOf(p) < 0)
perms.add(p);
}
public synchronized boolean implies(Permission p) {
for (int i = perms.size(); --i >= 0; ) {
if (((Permission)perms.get(i)).implies(p))
return true;
}
return false;
}
public Enumeration elements() {
return Collections.enumeration(perms);
}
}
}