/* |
|
* Copyright (c) 1998, 2013, Oracle and/or its affiliates. All rights reserved. |
|
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER. |
|
* |
|
* This code is free software; you can redistribute it and/or modify it |
|
* under the terms of the GNU General Public License version 2 only, as |
|
* published by the Free Software Foundation. Oracle designates this |
|
* particular file as subject to the "Classpath" exception as provided |
|
* by Oracle in the LICENSE file that accompanied this code. |
|
* |
|
* This code is distributed in the hope that it will be useful, but WITHOUT |
|
* ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or |
|
* FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License |
|
* version 2 for more details (a copy is included in the LICENSE file that |
|
* accompanied this code). |
|
* |
|
* You should have received a copy of the GNU General Public License version |
|
* 2 along with this work; if not, write to the Free Software Foundation, |
|
* Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA. |
|
* |
|
* Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA |
|
* or visit www.oracle.com if you need additional information or have any |
|
* questions. |
|
*/ |
|
package javax.security.auth; |
|
import java.util.*; |
|
import java.io.*; |
|
import java.lang.reflect.*; |
|
import java.text.MessageFormat; |
|
import java.security.AccessController; |
|
import java.security.AccessControlContext; |
|
import java.security.DomainCombiner; |
|
import java.security.Permission; |
|
import java.security.PermissionCollection; |
|
import java.security.Principal; |
|
import java.security.PrivilegedAction; |
|
import java.security.PrivilegedExceptionAction; |
|
import java.security.PrivilegedActionException; |
|
import java.security.ProtectionDomain; |
|
import sun.security.util.ResourcesMgr; |
|
/** |
|
* <p> A {@code Subject} represents a grouping of related information |
|
* for a single entity, such as a person. |
|
* Such information includes the Subject's identities as well as |
|
* its security-related attributes |
|
* (passwords and cryptographic keys, for example). |
|
* |
|
* <p> Subjects may potentially have multiple identities. |
|
* Each identity is represented as a {@code Principal} |
|
* within the {@code Subject}. Principals simply bind names to a |
|
* {@code Subject}. For example, a {@code Subject} that happens |
|
* to be a person, Alice, might have two Principals: |
|
* one which binds "Alice Bar", the name on her driver license, |
|
* to the {@code Subject}, and another which binds, |
|
* "999-99-9999", the number on her student identification card, |
|
* to the {@code Subject}. Both Principals refer to the same |
|
* {@code Subject} even though each has a different name. |
|
* |
|
* <p> A {@code Subject} may also own security-related attributes, |
|
* which are referred to as credentials. |
|
* Sensitive credentials that require special protection, such as |
|
* private cryptographic keys, are stored within a private credential |
|
* {@code Set}. Credentials intended to be shared, such as |
|
* public key certificates or Kerberos server tickets are stored |
|
* within a public credential {@code Set}. Different permissions |
|
* are required to access and modify the different credential Sets. |
|
* |
|
* <p> To retrieve all the Principals associated with a {@code Subject}, |
|
* invoke the {@code getPrincipals} method. To retrieve |
|
* all the public or private credentials belonging to a {@code Subject}, |
|
* invoke the {@code getPublicCredentials} method or |
|
* {@code getPrivateCredentials} method, respectively. |
|
* To modify the returned {@code Set} of Principals and credentials, |
|
* use the methods defined in the {@code Set} class. |
|
* For example: |
|
* <pre> |
|
* Subject subject; |
|
* Principal principal; |
|
* Object credential; |
|
* |
|
* // add a Principal and credential to the Subject |
|
* subject.getPrincipals().add(principal); |
|
* subject.getPublicCredentials().add(credential); |
|
* </pre> |
|
* |
|
* <p> This {@code Subject} class implements {@code Serializable}. |
|
* While the Principals associated with the {@code Subject} are serialized, |
|
* the credentials associated with the {@code Subject} are not. |
|
* Note that the {@code java.security.Principal} class |
|
* does not implement {@code Serializable}. Therefore all concrete |
|
* {@code Principal} implementations associated with Subjects |
|
* must implement {@code Serializable}. |
|
* |
|
* @see java.security.Principal |
|
* @see java.security.DomainCombiner |
|
*/ |
|
public final class Subject implements java.io.Serializable { |
|
private static final long serialVersionUID = -8308522755600156056L; |
|
/** |
|
* A {@code Set} that provides a view of all of this |
|
* Subject's Principals |
|
* |
|
* <p> |
|
* |
|
* @serial Each element in this set is a |
|
* {@code java.security.Principal}. |
|
* The set is a {@code Subject.SecureSet}. |
|
*/ |
|
Set<Principal> principals; |
|
/** |
|
* Sets that provide a view of all of this |
|
* Subject's Credentials |
|
*/ |
|
transient Set<Object> pubCredentials; |
|
transient Set<Object> privCredentials; |
|
/** |
|
* Whether this Subject is read-only |
|
* |
|
* @serial |
|
*/ |
|
private volatile boolean readOnly = false; |
|
private static final int PRINCIPAL_SET = 1; |
|
private static final int PUB_CREDENTIAL_SET = 2; |
|
private static final int PRIV_CREDENTIAL_SET = 3; |
|
private static final ProtectionDomain[] NULL_PD_ARRAY |
|
= new ProtectionDomain[0]; |
|
/** |
|
* Create an instance of a {@code Subject} |
|
* with an empty {@code Set} of Principals and empty |
|
* Sets of public and private credentials. |
|
* |
|
* <p> The newly constructed Sets check whether this {@code Subject} |
|
* has been set read-only before permitting subsequent modifications. |
|
* The newly created Sets also prevent illegal modifications |
|
* by ensuring that callers have sufficient permissions. |
|
* |
|
* <p> To modify the Principals Set, the caller must have |
|
* {@code AuthPermission("modifyPrincipals")}. |
|
* To modify the public credential Set, the caller must have |
|
* {@code AuthPermission("modifyPublicCredentials")}. |
|
* To modify the private credential Set, the caller must have |
|
* {@code AuthPermission("modifyPrivateCredentials")}. |
|
*/ |
|
public Subject() { |
|
this.principals = Collections.synchronizedSet |
|
(new SecureSet<Principal>(this, PRINCIPAL_SET)); |
|
this.pubCredentials = Collections.synchronizedSet |
|
(new SecureSet<Object>(this, PUB_CREDENTIAL_SET)); |
|
this.privCredentials = Collections.synchronizedSet |
|
(new SecureSet<Object>(this, PRIV_CREDENTIAL_SET)); |
|
} |
|
/** |
|
* Create an instance of a {@code Subject} with |
|
* Principals and credentials. |
|
* |
|
* <p> The Principals and credentials from the specified Sets |
|
* are copied into newly constructed Sets. |
|
* These newly created Sets check whether this {@code Subject} |
|
* has been set read-only before permitting subsequent modifications. |
|
* The newly created Sets also prevent illegal modifications |
|
* by ensuring that callers have sufficient permissions. |
|
* |
|
* <p> To modify the Principals Set, the caller must have |
|
* {@code AuthPermission("modifyPrincipals")}. |
|
* To modify the public credential Set, the caller must have |
|
* {@code AuthPermission("modifyPublicCredentials")}. |
|
* To modify the private credential Set, the caller must have |
|
* {@code AuthPermission("modifyPrivateCredentials")}. |
|
* <p> |
|
* |
|
* @param readOnly true if the {@code Subject} is to be read-only, |
|
* and false otherwise. <p> |
|
* |
|
* @param principals the {@code Set} of Principals |
|
* to be associated with this {@code Subject}. <p> |
|
* |
|
* @param pubCredentials the {@code Set} of public credentials |
|
* to be associated with this {@code Subject}. <p> |
|
* |
|
* @param privCredentials the {@code Set} of private credentials |
|
* to be associated with this {@code Subject}. |
|
* |
|
* @exception NullPointerException if the specified |
|
* {@code principals}, {@code pubCredentials}, |
|
* or {@code privCredentials} are {@code null}. |
|
*/ |
|
public Subject(boolean readOnly, Set<? extends Principal> principals, |
|
Set<?> pubCredentials, Set<?> privCredentials) |
|
{ |
|
if (principals == null || |
|
pubCredentials == null || |
|
privCredentials == null) |
|
throw new NullPointerException |
|
(ResourcesMgr.getString("invalid.null.input.s.")); |
|
this.principals = Collections.synchronizedSet(new SecureSet<Principal> |
|
(this, PRINCIPAL_SET, principals)); |
|
this.pubCredentials = Collections.synchronizedSet(new SecureSet<Object> |
|
(this, PUB_CREDENTIAL_SET, pubCredentials)); |
|
this.privCredentials = Collections.synchronizedSet(new SecureSet<Object> |
|
(this, PRIV_CREDENTIAL_SET, privCredentials)); |
|
this.readOnly = readOnly; |
|
} |
|
/** |
|
* Set this {@code Subject} to be read-only. |
|
* |
|
* <p> Modifications (additions and removals) to this Subject's |
|
* {@code Principal} {@code Set} and |
|
* credential Sets will be disallowed. |
|
* The {@code destroy} operation on this Subject's credentials will |
|
* still be permitted. |
|
* |
|
* <p> Subsequent attempts to modify the Subject's {@code Principal} |
|
* and credential Sets will result in an |
|
* {@code IllegalStateException} being thrown. |
|
* Also, once a {@code Subject} is read-only, |
|
* it can not be reset to being writable again. |
|
* |
|
* <p> |
|
* |
|
* @exception SecurityException if the caller does not have permission |
|
* to set this {@code Subject} to be read-only. |
|
*/ |
|
public void setReadOnly() { |
|
java.lang.SecurityManager sm = System.getSecurityManager(); |
|
if (sm != null) { |
|
sm.checkPermission(AuthPermissionHolder.SET_READ_ONLY_PERMISSION); |
|
} |
|
this.readOnly = true; |
|
} |
|
/** |
|
* Query whether this {@code Subject} is read-only. |
|
* |
|
* <p> |
|
* |
|
* @return true if this {@code Subject} is read-only, false otherwise. |
|
*/ |
|
public boolean isReadOnly() { |
|
return this.readOnly; |
|
} |
|
/** |
|
* Get the {@code Subject} associated with the provided |
|
* {@code AccessControlContext}. |
|
* |
|
* <p> The {@code AccessControlContext} may contain many |
|
* Subjects (from nested {@code doAs} calls). |
|
* In this situation, the most recent {@code Subject} associated |
|
* with the {@code AccessControlContext} is returned. |
|
* |
|
* <p> |
|
* |
|
* @param acc the {@code AccessControlContext} from which to retrieve |
|
* the {@code Subject}. |
|
* |
|
* @return the {@code Subject} associated with the provided |
|
* {@code AccessControlContext}, or {@code null} |
|
* if no {@code Subject} is associated |
|
* with the provided {@code AccessControlContext}. |
|
* |
|
* @exception SecurityException if the caller does not have permission |
|
* to get the {@code Subject}. <p> |
|
* |
|
* @exception NullPointerException if the provided |
|
* {@code AccessControlContext} is {@code null}. |
|
*/ |
|
public static Subject getSubject(final AccessControlContext acc) { |
|
java.lang.SecurityManager sm = System.getSecurityManager(); |
|
if (sm != null) { |
|
sm.checkPermission(AuthPermissionHolder.GET_SUBJECT_PERMISSION); |
|
} |
|
if (acc == null) { |
|
throw new NullPointerException(ResourcesMgr.getString |
|
("invalid.null.AccessControlContext.provided")); |
|
} |
|
// return the Subject from the DomainCombiner of the provided context |
|
return AccessController.doPrivileged |
|
(new java.security.PrivilegedAction<Subject>() { |
|
public Subject run() { |
|
DomainCombiner dc = acc.getDomainCombiner(); |
|
if (!(dc instanceof SubjectDomainCombiner)) |
|
return null; |
|
SubjectDomainCombiner sdc = (SubjectDomainCombiner)dc; |
|
return sdc.getSubject(); |
|
} |
|
}); |
|
} |
|
/** |
|
* Perform work as a particular {@code Subject}. |
|
* |
|
* <p> This method first retrieves the current Thread's |
|
* {@code AccessControlContext} via |
|
* {@code AccessController.getContext}, |
|
* and then instantiates a new {@code AccessControlContext} |
|
* using the retrieved context along with a new |
|
* {@code SubjectDomainCombiner} (constructed using |
|
* the provided {@code Subject}). |
|
* Finally, this method invokes {@code AccessController.doPrivileged}, |
|
* passing it the provided {@code PrivilegedAction}, |
|
* as well as the newly constructed {@code AccessControlContext}. |
|
* |
|
* <p> |
|
* |
|
* @param subject the {@code Subject} that the specified |
|
* {@code action} will run as. This parameter |
|
* may be {@code null}. <p> |
|
* |
|
* @param <T> the type of the value returned by the PrivilegedAction's |
|
* {@code run} method. |
|
* |
|
* @param action the code to be run as the specified |
|
* {@code Subject}. <p> |
|
* |
|
* @return the value returned by the PrivilegedAction's |
|
* {@code run} method. |
|
* |
|
* @exception NullPointerException if the {@code PrivilegedAction} |
|
* is {@code null}. <p> |
|
* |
|
* @exception SecurityException if the caller does not have permission |
|
* to invoke this method. |
|
*/ |
|
public static <T> T doAs(final Subject subject, |
|
final java.security.PrivilegedAction<T> action) { |
|
java.lang.SecurityManager sm = System.getSecurityManager(); |
|
if (sm != null) { |
|
sm.checkPermission(AuthPermissionHolder.DO_AS_PERMISSION); |
|
} |
|
if (action == null) |
|
throw new NullPointerException |
|
(ResourcesMgr.getString("invalid.null.action.provided")); |
|
// set up the new Subject-based AccessControlContext |
|
// for doPrivileged |
|
final AccessControlContext currentAcc = AccessController.getContext(); |
|
// call doPrivileged and push this new context on the stack |
|
return java.security.AccessController.doPrivileged |
|
(action, |
|
createContext(subject, currentAcc)); |
|
} |
|
/** |
|
* Perform work as a particular {@code Subject}. |
|
* |
|
* <p> This method first retrieves the current Thread's |
|
* {@code AccessControlContext} via |
|
* {@code AccessController.getContext}, |
|
* and then instantiates a new {@code AccessControlContext} |
|
* using the retrieved context along with a new |
|
* {@code SubjectDomainCombiner} (constructed using |
|
* the provided {@code Subject}). |
|
* Finally, this method invokes {@code AccessController.doPrivileged}, |
|
* passing it the provided {@code PrivilegedExceptionAction}, |
|
* as well as the newly constructed {@code AccessControlContext}. |
|
* |
|
* <p> |
|
* |
|
* @param subject the {@code Subject} that the specified |
|
* {@code action} will run as. This parameter |
|
* may be {@code null}. <p> |
|
* |
|
* @param <T> the type of the value returned by the |
|
* PrivilegedExceptionAction's {@code run} method. |
|
* |
|
* @param action the code to be run as the specified |
|
* {@code Subject}. <p> |
|
* |
|
* @return the value returned by the |
|
* PrivilegedExceptionAction's {@code run} method. |
|
* |
|
* @exception PrivilegedActionException if the |
|
* {@code PrivilegedExceptionAction.run} |
|
* method throws a checked exception. <p> |
|
* |
|
* @exception NullPointerException if the specified |
|
* {@code PrivilegedExceptionAction} is |
|
* {@code null}. <p> |
|
* |
|
* @exception SecurityException if the caller does not have permission |
|
* to invoke this method. |
|
*/ |
|
public static <T> T doAs(final Subject subject, |
|
final java.security.PrivilegedExceptionAction<T> action) |
|
throws java.security.PrivilegedActionException { |
|
java.lang.SecurityManager sm = System.getSecurityManager(); |
|
if (sm != null) { |
|
sm.checkPermission(AuthPermissionHolder.DO_AS_PERMISSION); |
|
} |
|
if (action == null) |
|
throw new NullPointerException |
|
(ResourcesMgr.getString("invalid.null.action.provided")); |
|
// set up the new Subject-based AccessControlContext for doPrivileged |
|
final AccessControlContext currentAcc = AccessController.getContext(); |
|
// call doPrivileged and push this new context on the stack |
|
return java.security.AccessController.doPrivileged |
|
(action, |
|
createContext(subject, currentAcc)); |
|
} |
|
/** |
|
* Perform privileged work as a particular {@code Subject}. |
|
* |
|
* <p> This method behaves exactly as {@code Subject.doAs}, |
|
* except that instead of retrieving the current Thread's |
|
* {@code AccessControlContext}, it uses the provided |
|
* {@code AccessControlContext}. If the provided |
|
* {@code AccessControlContext} is {@code null}, |
|
* this method instantiates a new {@code AccessControlContext} |
|
* with an empty collection of ProtectionDomains. |
|
* |
|
* <p> |
|
* |
|
* @param subject the {@code Subject} that the specified |
|
* {@code action} will run as. This parameter |
|
* may be {@code null}. <p> |
|
* |
|
* @param <T> the type of the value returned by the PrivilegedAction's |
|
* {@code run} method. |
|
* |
|
* @param action the code to be run as the specified |
|
* {@code Subject}. <p> |
|
* |
|
* @param acc the {@code AccessControlContext} to be tied to the |
|
* specified <i>subject</i> and <i>action</i>. <p> |
|
* |
|
* @return the value returned by the PrivilegedAction's |
|
* {@code run} method. |
|
* |
|
* @exception NullPointerException if the {@code PrivilegedAction} |
|
* is {@code null}. <p> |
|
* |
|
* @exception SecurityException if the caller does not have permission |
|
* to invoke this method. |
|
*/ |
|
public static <T> T doAsPrivileged(final Subject subject, |
|
final java.security.PrivilegedAction<T> action, |
|
final java.security.AccessControlContext acc) { |
|
java.lang.SecurityManager sm = System.getSecurityManager(); |
|
if (sm != null) { |
|
sm.checkPermission(AuthPermissionHolder.DO_AS_PRIVILEGED_PERMISSION); |
|
} |
|
if (action == null) |
|
throw new NullPointerException |
|
(ResourcesMgr.getString("invalid.null.action.provided")); |
|
// set up the new Subject-based AccessControlContext |
|
// for doPrivileged |
|
final AccessControlContext callerAcc = |
|
(acc == null ? |
|
new AccessControlContext(NULL_PD_ARRAY) : |
|
acc); |
|
// call doPrivileged and push this new context on the stack |
|
return java.security.AccessController.doPrivileged |
|
(action, |
|
createContext(subject, callerAcc)); |
|
} |
|
/** |
|
* Perform privileged work as a particular {@code Subject}. |
|
* |
|
* <p> This method behaves exactly as {@code Subject.doAs}, |
|
* except that instead of retrieving the current Thread's |
|
* {@code AccessControlContext}, it uses the provided |
|
* {@code AccessControlContext}. If the provided |
|
* {@code AccessControlContext} is {@code null}, |
|
* this method instantiates a new {@code AccessControlContext} |
|
* with an empty collection of ProtectionDomains. |
|
* |
|
* <p> |
|
* |
|
* @param subject the {@code Subject} that the specified |
|
* {@code action} will run as. This parameter |
|
* may be {@code null}. <p> |
|
* |
|
* @param <T> the type of the value returned by the |
|
* PrivilegedExceptionAction's {@code run} method. |
|
* |
|
* @param action the code to be run as the specified |
|
* {@code Subject}. <p> |
|
* |
|
* @param acc the {@code AccessControlContext} to be tied to the |
|
* specified <i>subject</i> and <i>action</i>. <p> |
|
* |
|
* @return the value returned by the |
|
* PrivilegedExceptionAction's {@code run} method. |
|
* |
|
* @exception PrivilegedActionException if the |
|
* {@code PrivilegedExceptionAction.run} |
|
* method throws a checked exception. <p> |
|
* |
|
* @exception NullPointerException if the specified |
|
* {@code PrivilegedExceptionAction} is |
|
* {@code null}. <p> |
|
* |
|
* @exception SecurityException if the caller does not have permission |
|
* to invoke this method. |
|
*/ |
|
public static <T> T doAsPrivileged(final Subject subject, |
|
final java.security.PrivilegedExceptionAction<T> action, |
|
final java.security.AccessControlContext acc) |
|
throws java.security.PrivilegedActionException { |
|
java.lang.SecurityManager sm = System.getSecurityManager(); |
|
if (sm != null) { |
|
sm.checkPermission(AuthPermissionHolder.DO_AS_PRIVILEGED_PERMISSION); |
|
} |
|
if (action == null) |
|
throw new NullPointerException |
|
(ResourcesMgr.getString("invalid.null.action.provided")); |
|
// set up the new Subject-based AccessControlContext for doPrivileged |
|
final AccessControlContext callerAcc = |
|
(acc == null ? |
|
new AccessControlContext(NULL_PD_ARRAY) : |
|
acc); |
|
// call doPrivileged and push this new context on the stack |
|
return java.security.AccessController.doPrivileged |
|
(action, |
|
createContext(subject, callerAcc)); |
|
} |
|
private static AccessControlContext createContext(final Subject subject, |
|
final AccessControlContext acc) { |
|
return java.security.AccessController.doPrivileged |
|
(new java.security.PrivilegedAction<AccessControlContext>() { |
|
public AccessControlContext run() { |
|
if (subject == null) |
|
return new AccessControlContext(acc, null); |
|
else |
|
return new AccessControlContext |
|
(acc, |
|
new SubjectDomainCombiner(subject)); |
|
} |
|
}); |
|
} |
|
/** |
|
* Return the {@code Set} of Principals associated with this |
|
* {@code Subject}. Each {@code Principal} represents |
|
* an identity for this {@code Subject}. |
|
* |
|
* <p> The returned {@code Set} is backed by this Subject's |
|
* internal {@code Principal} {@code Set}. Any modification |
|
* to the returned {@code Set} affects the internal |
|
* {@code Principal} {@code Set} as well. |
|
* |
|
* <p> |
|
* |
|
* @return The {@code Set} of Principals associated with this |
|
* {@code Subject}. |
|
*/ |
|
public Set<Principal> getPrincipals() { |
|
// always return an empty Set instead of null |
|
// so LoginModules can add to the Set if necessary |
|
return principals; |
|
} |
|
/** |
|
* Return a {@code Set} of Principals associated with this |
|
* {@code Subject} that are instances or subclasses of the specified |
|
* {@code Class}. |
|
* |
|
* <p> The returned {@code Set} is not backed by this Subject's |
|
* internal {@code Principal} {@code Set}. A new |
|
* {@code Set} is created and returned for each method invocation. |
|
* Modifications to the returned {@code Set} |
|
* will not affect the internal {@code Principal} {@code Set}. |
|
* |
|
* <p> |
|
* |
|
* @param <T> the type of the class modeled by {@code c} |
|
* |
|
* @param c the returned {@code Set} of Principals will all be |
|
* instances of this class. |
|
* |
|
* @return a {@code Set} of Principals that are instances of the |
|
* specified {@code Class}. |
|
* |
|
* @exception NullPointerException if the specified {@code Class} |
|
* is {@code null}. |
|
*/ |
|
public <T extends Principal> Set<T> getPrincipals(Class<T> c) { |
|
if (c == null) |
|
throw new NullPointerException |
|
(ResourcesMgr.getString("invalid.null.Class.provided")); |
|
// always return an empty Set instead of null |
|
// so LoginModules can add to the Set if necessary |
|
return new ClassSet<T>(PRINCIPAL_SET, c); |
|
} |
|
/** |
|
* Return the {@code Set} of public credentials held by this |
|
* {@code Subject}. |
|
* |
|
* <p> The returned {@code Set} is backed by this Subject's |
|
* internal public Credential {@code Set}. Any modification |
|
* to the returned {@code Set} affects the internal public |
|
* Credential {@code Set} as well. |
|
* |
|
* <p> |
|
* |
|
* @return A {@code Set} of public credentials held by this |
|
* {@code Subject}. |
|
*/ |
|
public Set<Object> getPublicCredentials() { |
|
// always return an empty Set instead of null |
|
// so LoginModules can add to the Set if necessary |
|
return pubCredentials; |
|
} |
|
/** |
|
* Return the {@code Set} of private credentials held by this |
|
* {@code Subject}. |
|
* |
|
* <p> The returned {@code Set} is backed by this Subject's |
|
* internal private Credential {@code Set}. Any modification |
|
* to the returned {@code Set} affects the internal private |
|
* Credential {@code Set} as well. |
|
* |
|
* <p> A caller requires permissions to access the Credentials |
|
* in the returned {@code Set}, or to modify the |
|
* {@code Set} itself. A {@code SecurityException} |
|
* is thrown if the caller does not have the proper permissions. |
|
* |
|
* <p> While iterating through the {@code Set}, |
|
* a {@code SecurityException} is thrown |
|
* if the caller does not have permission to access a |
|
* particular Credential. The {@code Iterator} |
|
* is nevertheless advanced to next element in the {@code Set}. |
|
* |
|
* <p> |
|
* |
|
* @return A {@code Set} of private credentials held by this |
|
* {@code Subject}. |
|
*/ |
|
public Set<Object> getPrivateCredentials() { |
|
// XXX |
|
// we do not need a security check for |
|
// AuthPermission(getPrivateCredentials) |
|
// because we already restrict access to private credentials |
|
// via the PrivateCredentialPermission. all the extra AuthPermission |
|
// would do is protect the set operations themselves |
|
// (like size()), which don't seem security-sensitive. |
|
// always return an empty Set instead of null |
|
// so LoginModules can add to the Set if necessary |
|
return privCredentials; |
|
} |
|
/** |
|
* Return a {@code Set} of public credentials associated with this |
|
* {@code Subject} that are instances or subclasses of the specified |
|
* {@code Class}. |
|
* |
|
* <p> The returned {@code Set} is not backed by this Subject's |
|
* internal public Credential {@code Set}. A new |
|
* {@code Set} is created and returned for each method invocation. |
|
* Modifications to the returned {@code Set} |
|
* will not affect the internal public Credential {@code Set}. |
|
* |
|
* <p> |
|
* |
|
* @param <T> the type of the class modeled by {@code c} |
|
* |
|
* @param c the returned {@code Set} of public credentials will all be |
|
* instances of this class. |
|
* |
|
* @return a {@code Set} of public credentials that are instances |
|
* of the specified {@code Class}. |
|
* |
|
* @exception NullPointerException if the specified {@code Class} |
|
* is {@code null}. |
|
*/ |
|
public <T> Set<T> getPublicCredentials(Class<T> c) { |
|
if (c == null) |
|
throw new NullPointerException |
|
(ResourcesMgr.getString("invalid.null.Class.provided")); |
|
// always return an empty Set instead of null |
|
// so LoginModules can add to the Set if necessary |
|
return new ClassSet<T>(PUB_CREDENTIAL_SET, c); |
|
} |
|
/** |
|
* Return a {@code Set} of private credentials associated with this |
|
* {@code Subject} that are instances or subclasses of the specified |
|
* {@code Class}. |
|
* |
|
* <p> The caller must have permission to access all of the |
|
* requested Credentials, or a {@code SecurityException} |
|
* will be thrown. |
|
* |
|
* <p> The returned {@code Set} is not backed by this Subject's |
|
* internal private Credential {@code Set}. A new |
|
* {@code Set} is created and returned for each method invocation. |
|
* Modifications to the returned {@code Set} |
|
* will not affect the internal private Credential {@code Set}. |
|
* |
|
* <p> |
|
* |
|
* @param <T> the type of the class modeled by {@code c} |
|
* |
|
* @param c the returned {@code Set} of private credentials will all be |
|
* instances of this class. |
|
* |
|
* @return a {@code Set} of private credentials that are instances |
|
* of the specified {@code Class}. |
|
* |
|
* @exception NullPointerException if the specified {@code Class} |
|
* is {@code null}. |
|
*/ |
|
public <T> Set<T> getPrivateCredentials(Class<T> c) { |
|
// XXX |
|
// we do not need a security check for |
|
// AuthPermission(getPrivateCredentials) |
|
// because we already restrict access to private credentials |
|
// via the PrivateCredentialPermission. all the extra AuthPermission |
|
// would do is protect the set operations themselves |
|
// (like size()), which don't seem security-sensitive. |
|
if (c == null) |
|
throw new NullPointerException |
|
(ResourcesMgr.getString("invalid.null.Class.provided")); |
|
// always return an empty Set instead of null |
|
// so LoginModules can add to the Set if necessary |
|
return new ClassSet<T>(PRIV_CREDENTIAL_SET, c); |
|
} |
|
/** |
|
* Compares the specified Object with this {@code Subject} |
|
* for equality. Returns true if the given object is also a Subject |
|
* and the two {@code Subject} instances are equivalent. |
|
* More formally, two {@code Subject} instances are |
|
* equal if their {@code Principal} and {@code Credential} |
|
* Sets are equal. |
|
* |
|
* <p> |
|
* |
|
* @param o Object to be compared for equality with this |
|
* {@code Subject}. |
|
* |
|
* @return true if the specified Object is equal to this |
|
* {@code Subject}. |
|
* |
|
* @exception SecurityException if the caller does not have permission |
|
* to access the private credentials for this {@code Subject}, |
|
* or if the caller does not have permission to access the |
|
* private credentials for the provided {@code Subject}. |
|
*/ |
|
public boolean equals(Object o) { |
|
if (o == null) |
|
return false; |
|
if (this == o) |
|
return true; |
|
if (o instanceof Subject) { |
|
final Subject that = (Subject)o; |
|
// check the principal and credential sets |
|
Set<Principal> thatPrincipals; |
|
synchronized(that.principals) { |
|
// avoid deadlock from dual locks |
|
thatPrincipals = new HashSet<Principal>(that.principals); |
|
} |
|
if (!principals.equals(thatPrincipals)) { |
|
return false; |
|
} |
|
Set<Object> thatPubCredentials; |
|
synchronized(that.pubCredentials) { |
|
// avoid deadlock from dual locks |
|
thatPubCredentials = new HashSet<Object>(that.pubCredentials); |
|
} |
|
if (!pubCredentials.equals(thatPubCredentials)) { |
|
return false; |
|
} |
|
Set<Object> thatPrivCredentials; |
|
synchronized(that.privCredentials) { |
|
// avoid deadlock from dual locks |
|
thatPrivCredentials = new HashSet<Object>(that.privCredentials); |
|
} |
|
if (!privCredentials.equals(thatPrivCredentials)) { |
|
return false; |
|
} |
|
return true; |
|
} |
|
return false; |
|
} |
|
/** |
|
* Return the String representation of this {@code Subject}. |
|
* |
|
* <p> |
|
* |
|
* @return the String representation of this {@code Subject}. |
|
*/ |
|
public String toString() { |
|
return toString(true); |
|
} |
|
/** |
|
* package private convenience method to print out the Subject |
|
* without firing off a security check when trying to access |
|
* the Private Credentials |
|
*/ |
|
String toString(boolean includePrivateCredentials) { |
|
String s = ResourcesMgr.getString("Subject."); |
|
String suffix = ""; |
|
synchronized(principals) { |
|
Iterator<Principal> pI = principals.iterator(); |
|
while (pI.hasNext()) { |
|
Principal p = pI.next(); |
|
suffix = suffix + ResourcesMgr.getString(".Principal.") + |
|
p.toString() + ResourcesMgr.getString("NEWLINE"); |
|
} |
|
} |
|
synchronized(pubCredentials) { |
|
Iterator<Object> pI = pubCredentials.iterator(); |
|
while (pI.hasNext()) { |
|
Object o = pI.next(); |
|
suffix = suffix + |
|
ResourcesMgr.getString(".Public.Credential.") + |
|
o.toString() + ResourcesMgr.getString("NEWLINE"); |
|
} |
|
} |
|
if (includePrivateCredentials) { |
|
synchronized(privCredentials) { |
|
Iterator<Object> pI = privCredentials.iterator(); |
|
while (pI.hasNext()) { |
|
try { |
|
Object o = pI.next(); |
|
suffix += ResourcesMgr.getString |
|
(".Private.Credential.") + |
|
o.toString() + |
|
ResourcesMgr.getString("NEWLINE"); |
|
} catch (SecurityException se) { |
|
suffix += ResourcesMgr.getString |
|
(".Private.Credential.inaccessible."); |
|
break; |
|
} |
|
} |
|
} |
|
} |
|
return s + suffix; |
|
} |
|
/** |
|
* Returns a hashcode for this {@code Subject}. |
|
* |
|
* <p> |
|
* |
|
* @return a hashcode for this {@code Subject}. |
|
* |
|
* @exception SecurityException if the caller does not have permission |
|
* to access this Subject's private credentials. |
|
*/ |
|
public int hashCode() { |
|
/** |
|
* The hashcode is derived exclusive or-ing the |
|
* hashcodes of this Subject's Principals and credentials. |
|
* |
|
* If a particular credential was destroyed |
|
* ({@code credential.hashCode()} throws an |
|
* {@code IllegalStateException}), |
|
* the hashcode for that credential is derived via: |
|
* {@code credential.getClass().toString().hashCode()}. |
|
*/ |
|
int hashCode = 0; |
|
synchronized(principals) { |
|
Iterator<Principal> pIterator = principals.iterator(); |
|
while (pIterator.hasNext()) { |
|
Principal p = pIterator.next(); |
|
hashCode ^= p.hashCode(); |
|
} |
|
} |
|
synchronized(pubCredentials) { |
|
Iterator<Object> pubCIterator = pubCredentials.iterator(); |
|
while (pubCIterator.hasNext()) { |
|
hashCode ^= getCredHashCode(pubCIterator.next()); |
|
} |
|
} |
|
return hashCode; |
|
} |
|
/** |
|
* get a credential's hashcode |
|
*/ |
|
private int getCredHashCode(Object o) { |
|
try { |
|
return o.hashCode(); |
|
} catch (IllegalStateException ise) { |
|
return o.getClass().toString().hashCode(); |
|
} |
|
} |
|
/** |
|
* Writes this object out to a stream (i.e., serializes it). |
|
*/ |
|
private void writeObject(java.io.ObjectOutputStream oos) |
|
throws java.io.IOException { |
|
synchronized(principals) { |
|
oos.defaultWriteObject(); |
|
} |
|
} |
|
/** |
|
* Reads this object from a stream (i.e., deserializes it) |
|
*/ |
|
@SuppressWarnings("unchecked") |
|
private void readObject(java.io.ObjectInputStream s) |
|
throws java.io.IOException, ClassNotFoundException { |
|
ObjectInputStream.GetField gf = s.readFields(); |
|
readOnly = gf.get("readOnly", false); |
|
Set<Principal> inputPrincs = (Set<Principal>)gf.get("principals", null); |
|
// Rewrap the principals into a SecureSet |
|
if (inputPrincs == null) { |
|
throw new NullPointerException |
|
(ResourcesMgr.getString("invalid.null.input.s.")); |
|
} |
|
try { |
|
principals = Collections.synchronizedSet(new SecureSet<Principal> |
|
(this, PRINCIPAL_SET, inputPrincs)); |
|
} catch (NullPointerException npe) { |
|
// Sometimes people deserialize the principals set only. |
|
// Subject is not accessible, so just don't fail. |
|
principals = Collections.synchronizedSet |
|
(new SecureSet<Principal>(this, PRINCIPAL_SET)); |
|
} |
|
// The Credential {@code Set} is not serialized, but we do not |
|
// want the default deserialization routine to set it to null. |
|
this.pubCredentials = Collections.synchronizedSet |
|
(new SecureSet<Object>(this, PUB_CREDENTIAL_SET)); |
|
this.privCredentials = Collections.synchronizedSet |
|
(new SecureSet<Object>(this, PRIV_CREDENTIAL_SET)); |
|
} |
|
/** |
|
* Prevent modifications unless caller has permission. |
|
* |
|
* @serial include |
|
*/ |
|
private static class SecureSet<E> |
|
extends AbstractSet<E> |
|
implements java.io.Serializable { |
|
private static final long serialVersionUID = 7911754171111800359L; |
|
/** |
|
* @serialField this$0 Subject The outer Subject instance. |
|
* @serialField elements LinkedList The elements in this set. |
|
*/ |
|
private static final ObjectStreamField[] serialPersistentFields = { |
|
new ObjectStreamField("this$0", Subject.class), |
|
new ObjectStreamField("elements", LinkedList.class), |
|
new ObjectStreamField("which", int.class) |
|
}; |
|
Subject subject; |
|
LinkedList<E> elements; |
|
/** |
|
* @serial An integer identifying the type of objects contained |
|
* in this set. If {@code which == 1}, |
|
* this is a Principal set and all the elements are |
|
* of type {@code java.security.Principal}. |
|
* If {@code which == 2}, this is a public credential |
|
* set and all the elements are of type {@code Object}. |
|
* If {@code which == 3}, this is a private credential |
|
* set and all the elements are of type {@code Object}. |
|
*/ |
|
private int which; |
|
SecureSet(Subject subject, int which) { |
|
this.subject = subject; |
|
this.which = which; |
|
this.elements = new LinkedList<E>(); |
|
} |
|
SecureSet(Subject subject, int which, Set<? extends E> set) { |
|
this.subject = subject; |
|
this.which = which; |
|
this.elements = new LinkedList<E>(set); |
|
} |
|
public int size() { |
|
return elements.size(); |
|
} |
|
public Iterator<E> iterator() { |
|
final LinkedList<E> list = elements; |
|
return new Iterator<E>() { |
|
ListIterator<E> i = list.listIterator(0); |
|
public boolean hasNext() {return i.hasNext();} |
|
public E next() { |
|
if (which != Subject.PRIV_CREDENTIAL_SET) { |
|
return i.next(); |
|
} |
|
SecurityManager sm = System.getSecurityManager(); |
|
if (sm != null) { |
|
try { |
|
sm.checkPermission(new PrivateCredentialPermission |
|
(list.get(i.nextIndex()).getClass().getName(), |
|
subject.getPrincipals())); |
|
} catch (SecurityException se) { |
|
i.next(); |
|
throw (se); |
|
} |
|
} |
|
return i.next(); |
|
} |
|
public void remove() { |
|
if (subject.isReadOnly()) { |
|
throw new IllegalStateException(ResourcesMgr.getString |
|
("Subject.is.read.only")); |
|
} |
|
java.lang.SecurityManager sm = System.getSecurityManager(); |
|
if (sm != null) { |
|
switch (which) { |
|
case Subject.PRINCIPAL_SET: |
|
sm.checkPermission(AuthPermissionHolder.MODIFY_PRINCIPALS_PERMISSION); |
|
break; |
|
case Subject.PUB_CREDENTIAL_SET: |
|
sm.checkPermission(AuthPermissionHolder.MODIFY_PUBLIC_CREDENTIALS_PERMISSION); |
|
break; |
|
default: |
|
sm.checkPermission(AuthPermissionHolder.MODIFY_PRIVATE_CREDENTIALS_PERMISSION); |
|
break; |
|
} |
|
} |
|
i.remove(); |
|
} |
|
}; |
|
} |
|
public boolean add(E o) { |
|
if (subject.isReadOnly()) { |
|
throw new IllegalStateException |
|
(ResourcesMgr.getString("Subject.is.read.only")); |
|
} |
|
java.lang.SecurityManager sm = System.getSecurityManager(); |
|
if (sm != null) { |
|
switch (which) { |
|
case Subject.PRINCIPAL_SET: |
|
sm.checkPermission(AuthPermissionHolder.MODIFY_PRINCIPALS_PERMISSION); |
|
break; |
|
case Subject.PUB_CREDENTIAL_SET: |
|
sm.checkPermission(AuthPermissionHolder.MODIFY_PUBLIC_CREDENTIALS_PERMISSION); |
|
break; |
|
default: |
|
sm.checkPermission(AuthPermissionHolder.MODIFY_PRIVATE_CREDENTIALS_PERMISSION); |
|
break; |
|
} |
|
} |
|
switch (which) { |
|
case Subject.PRINCIPAL_SET: |
|
if (!(o instanceof Principal)) { |
|
throw new SecurityException(ResourcesMgr.getString |
|
("attempting.to.add.an.object.which.is.not.an.instance.of.java.security.Principal.to.a.Subject.s.Principal.Set")); |
|
} |
|
break; |
|
default: |
|
// ok to add Objects of any kind to credential sets |
|
break; |
|
} |
|
// check for duplicates |
|
if (!elements.contains(o)) |
|
return elements.add(o); |
|
else |
|
return false; |
|
} |
|
public boolean remove(Object o) { |
|
final Iterator<E> e = iterator(); |
|
while (e.hasNext()) { |
|
E next; |
|
if (which != Subject.PRIV_CREDENTIAL_SET) { |
|
next = e.next(); |
|
} else { |
|
next = java.security.AccessController.doPrivileged |
|
(new java.security.PrivilegedAction<E>() { |
|
public E run() { |
|
return e.next(); |
|
} |
|
}); |
|
} |
|
if (next == null) { |
|
if (o == null) { |
|
e.remove(); |
|
return true; |
|
} |
|
} else if (next.equals(o)) { |
|
e.remove(); |
|
return true; |
|
} |
|
} |
|
return false; |
|
} |
|
public boolean contains(Object o) { |
|
final Iterator<E> e = iterator(); |
|
while (e.hasNext()) { |
|
E next; |
|
if (which != Subject.PRIV_CREDENTIAL_SET) { |
|
next = e.next(); |
|
} else { |
|
// For private credentials: |
|
// If the caller does not have read permission for |
|
// for o.getClass(), we throw a SecurityException. |
|
// Otherwise we check the private cred set to see whether |
|
// it contains the Object |
|
SecurityManager sm = System.getSecurityManager(); |
|
if (sm != null) { |
|
sm.checkPermission(new PrivateCredentialPermission |
|
(o.getClass().getName(), |
|
subject.getPrincipals())); |
|
} |
|
next = java.security.AccessController.doPrivileged |
|
(new java.security.PrivilegedAction<E>() { |
|
public E run() { |
|
return e.next(); |
|
} |
|
}); |
|
} |
|
if (next == null) { |
|
if (o == null) { |
|
return true; |
|
} |
|
} else if (next.equals(o)) { |
|
return true; |
|
} |
|
} |
|
return false; |
|
} |
|
public boolean removeAll(Collection<?> c) { |
|
Objects.requireNonNull(c); |
|
boolean modified = false; |
|
final Iterator<E> e = iterator(); |
|
while (e.hasNext()) { |
|
E next; |
|
if (which != Subject.PRIV_CREDENTIAL_SET) { |
|
next = e.next(); |
|
} else { |
|
next = java.security.AccessController.doPrivileged |
|
(new java.security.PrivilegedAction<E>() { |
|
public E run() { |
|
return e.next(); |
|
} |
|
}); |
|
} |
|
Iterator<?> ce = c.iterator(); |
|
while (ce.hasNext()) { |
|
Object o = ce.next(); |
|
if (next == null) { |
|
if (o == null) { |
|
e.remove(); |
|
modified = true; |
|
break; |
|
} |
|
} else if (next.equals(o)) { |
|
e.remove(); |
|
modified = true; |
|
break; |
|
} |
|
} |
|
} |
|
return modified; |
|
} |
|
public boolean retainAll(Collection<?> c) { |
|
Objects.requireNonNull(c); |
|
boolean modified = false; |
|
boolean retain = false; |
|
final Iterator<E> e = iterator(); |
|
while (e.hasNext()) { |
|
retain = false; |
|
E next; |
|
if (which != Subject.PRIV_CREDENTIAL_SET) { |
|
next = e.next(); |
|
} else { |
|
next = java.security.AccessController.doPrivileged |
|
(new java.security.PrivilegedAction<E>() { |
|
public E run() { |
|
return e.next(); |
|
} |
|
}); |
|
} |
|
Iterator<?> ce = c.iterator(); |
|
while (ce.hasNext()) { |
|
Object o = ce.next(); |
|
if (next == null) { |
|
if (o == null) { |
|
retain = true; |
|
break; |
|
} |
|
} else if (next.equals(o)) { |
|
retain = true; |
|
break; |
|
} |
|
} |
|
if (!retain) { |
|
e.remove(); |
|
retain = false; |
|
modified = true; |
|
} |
|
} |
|
return modified; |
|
} |
|
public void clear() { |
|
final Iterator<E> e = iterator(); |
|
while (e.hasNext()) { |
|
E next; |
|
if (which != Subject.PRIV_CREDENTIAL_SET) { |
|
next = e.next(); |
|
} else { |
|
next = java.security.AccessController.doPrivileged |
|
(new java.security.PrivilegedAction<E>() { |
|
public E run() { |
|
return e.next(); |
|
} |
|
}); |
|
} |
|
e.remove(); |
|
} |
|
} |
|
/** |
|
* Writes this object out to a stream (i.e., serializes it). |
|
* |
|
* <p> |
|
* |
|
* @serialData If this is a private credential set, |
|
* a security check is performed to ensure that |
|
* the caller has permission to access each credential |
|
* in the set. If the security check passes, |
|
* the set is serialized. |
|
*/ |
|
private void writeObject(java.io.ObjectOutputStream oos) |
|
throws java.io.IOException { |
|
if (which == Subject.PRIV_CREDENTIAL_SET) { |
|
// check permissions before serializing |
|
Iterator<E> i = iterator(); |
|
while (i.hasNext()) { |
|
i.next(); |
|
} |
|
} |
|
ObjectOutputStream.PutField fields = oos.putFields(); |
|
fields.put("this$0", subject); |
|
fields.put("elements", elements); |
|
fields.put("which", which); |
|
oos.writeFields(); |
|
} |
|
@SuppressWarnings("unchecked") |
|
private void readObject(ObjectInputStream ois) |
|
throws IOException, ClassNotFoundException |
|
{ |
|
ObjectInputStream.GetField fields = ois.readFields(); |
|
subject = (Subject) fields.get("this$0", null); |
|
which = fields.get("which", 0); |
|
LinkedList<E> tmp = (LinkedList<E>) fields.get("elements", null); |
|
if (tmp.getClass() != LinkedList.class) { |
|
elements = new LinkedList<E>(tmp); |
|
} else { |
|
elements = tmp; |
|
} |
|
} |
|
} |
|
/** |
|
* This class implements a {@code Set} which returns only |
|
* members that are an instance of a specified Class. |
|
*/ |
|
private class ClassSet<T> extends AbstractSet<T> { |
|
private int which; |
|
private Class<T> c; |
|
private Set<T> set; |
|
ClassSet(int which, Class<T> c) { |
|
this.which = which; |
|
this.c = c; |
|
set = new HashSet<T>(); |
|
switch (which) { |
|
case Subject.PRINCIPAL_SET: |
|
synchronized(principals) { populateSet(); } |
|
break; |
|
case Subject.PUB_CREDENTIAL_SET: |
|
synchronized(pubCredentials) { populateSet(); } |
|
break; |
|
default: |
|
synchronized(privCredentials) { populateSet(); } |
|
break; |
|
} |
|
} |
|
@SuppressWarnings("unchecked") /*To suppress warning from line 1374*/ |
|
private void populateSet() { |
|
final Iterator<?> iterator; |
|
switch(which) { |
|
case Subject.PRINCIPAL_SET: |
|
iterator = Subject.this.principals.iterator(); |
|
break; |
|
case Subject.PUB_CREDENTIAL_SET: |
|
iterator = Subject.this.pubCredentials.iterator(); |
|
break; |
|
default: |
|
iterator = Subject.this.privCredentials.iterator(); |
|
break; |
|
} |
|
// Check whether the caller has permisson to get |
|
// credentials of Class c |
|
while (iterator.hasNext()) { |
|
Object next; |
|
if (which == Subject.PRIV_CREDENTIAL_SET) { |
|
next = java.security.AccessController.doPrivileged |
|
(new java.security.PrivilegedAction<Object>() { |
|
public Object run() { |
|
return iterator.next(); |
|
} |
|
}); |
|
} else { |
|
next = iterator.next(); |
|
} |
|
if (c.isAssignableFrom(next.getClass())) { |
|
if (which != Subject.PRIV_CREDENTIAL_SET) { |
|
set.add((T)next); |
|
} else { |
|
// Check permission for private creds |
|
SecurityManager sm = System.getSecurityManager(); |
|
if (sm != null) { |
|
sm.checkPermission(new PrivateCredentialPermission |
|
(next.getClass().getName(), |
|
Subject.this.getPrincipals())); |
|
} |
|
set.add((T)next); |
|
} |
|
} |
|
} |
|
} |
|
public int size() { |
|
return set.size(); |
|
} |
|
public Iterator<T> iterator() { |
|
return set.iterator(); |
|
} |
|
public boolean add(T o) { |
|
if (!o.getClass().isAssignableFrom(c)) { |
|
MessageFormat form = new MessageFormat(ResourcesMgr.getString |
|
("attempting.to.add.an.object.which.is.not.an.instance.of.class")); |
|
Object[] source = {c.toString()}; |
|
throw new SecurityException(form.format(source)); |
|
} |
|
return set.add(o); |
|
} |
|
} |
|
static class AuthPermissionHolder { |
|
static final AuthPermission DO_AS_PERMISSION = |
|
new AuthPermission("doAs"); |
|
static final AuthPermission DO_AS_PRIVILEGED_PERMISSION = |
|
new AuthPermission("doAsPrivileged"); |
|
static final AuthPermission SET_READ_ONLY_PERMISSION = |
|
new AuthPermission("setReadOnly"); |
|
static final AuthPermission GET_SUBJECT_PERMISSION = |
|
new AuthPermission("getSubject"); |
|
static final AuthPermission MODIFY_PRINCIPALS_PERMISSION = |
|
new AuthPermission("modifyPrincipals"); |
|
static final AuthPermission MODIFY_PUBLIC_CREDENTIALS_PERMISSION = |
|
new AuthPermission("modifyPublicCredentials"); |
|
static final AuthPermission MODIFY_PRIVATE_CREDENTIALS_PERMISSION = |
|
new AuthPermission("modifyPrivateCredentials"); |
|
} |
|
} |