/* * Copyright 2002-2016 the original author or authors. * * Licensed under the Apache License, Version 2.0 (the "License"); * you may not use this file except in compliance with the License. * You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ package org.springframework.security.access.expression; import java.io.Serializable; import org.apache.commons.logging.Log; import org.apache.commons.logging.LogFactory; import org.springframework.security.access.PermissionEvaluator; import org.springframework.security.core.Authentication; /** * A null PermissionEvaluator which denies all access. Used by default for situations when * permission evaluation should not be required. * * @author Luke Taylor * @since 3.0 */ public class DenyAllPermissionEvaluator implements PermissionEvaluator { private final Log logger = LogFactory.getLog(getClass()); /** * @return false always */ public boolean hasPermission(Authentication authentication, Object target, Object permission) { logger.warn("Denying user " + authentication.getName() + " permission '" + permission + "' on object " + target); return false; } /** * @return false always */ public boolean hasPermission(Authentication authentication, Serializable targetId, String targetType, Object permission) { logger.warn("Denying user " + authentication.getName() + " permission '" + permission + "' on object with Id '" + targetId); return false; } }