Java Code Examples for javax.security.auth.PrivateCredentialPermission#getCredentialClass()

The following examples show how to use javax.security.auth.PrivateCredentialPermission#getCredentialClass() . You can vote up the ones you like or vote down the ones you don't like, and go to the original project or source file by following the links above each example. You may check out the related API usage on the sidebar.
Example 1
Source File: AuthPolicyFile.java    From dragonwell8_jdk with GNU General Public License v2.0 4 votes vote down vote up
/**
 * Returns true if 'Self' permissions were added to the provided
 * 'perms', and false otherwise.
 *
 * <p>
 *
 * @param p check to see if this Permission is a "SELF"
 *                  PrivateCredentialPermission. <p>
 *
 * @param entryCs the codesource for the Policy entry.
 *
 * @param accCs the codesource for from the current AccessControlContext.
 *
 * @param perms the PermissionCollection where the individual
 *                  PrivateCredentialPermissions will be added.
 */
private boolean addSelfPermissions(final Permission p,
                                   CodeSource entryCs,
                                   CodeSource accCs,
                                   Permissions perms) {

    if (!(p instanceof PrivateCredentialPermission)) {
        return false;
    }

    if (!(entryCs instanceof SubjectCodeSource)) {
        return false;
    }

    PrivateCredentialPermission pcp = (PrivateCredentialPermission)p;
    SubjectCodeSource scs = (SubjectCodeSource)entryCs;

    // see if it is a SELF permission
    String[][] pPrincipals = pcp.getPrincipals();
    if (pPrincipals.length <= 0 ||
        !pPrincipals[0][0].equalsIgnoreCase("self") ||
        !pPrincipals[0][1].equalsIgnoreCase("self")) {

        // regular PrivateCredentialPermission
        return false;
    } else {

        // granted a SELF permission - create a
        // PrivateCredentialPermission for each
        // of the Policy entry's CodeSource Principals

        if (scs.getPrincipals() == null) {
            // XXX SubjectCodeSource has no Subject???
            return true;
        }

        for (PrincipalEntry principal : scs.getPrincipals()) {

            //      if the Policy entry's Principal does not contain a
            //              WILDCARD for the Principal name, then a
            //              new PrivateCredentialPermission is created
            //              for the Principal listed in the Policy entry.
            //      if the Policy entry's Principal contains a WILDCARD
            //              for the Principal name, then a new
            //              PrivateCredentialPermission is created
            //              for each Principal associated with the Subject
            //              in the current ACC.

            String[][] principalInfo = getPrincipalInfo(principal, accCs);

            for (int i = 0; i < principalInfo.length; i++) {

                // here's the new PrivateCredentialPermission

                PrivateCredentialPermission newPcp =
                    new PrivateCredentialPermission
                            (pcp.getCredentialClass() +
                                    " " +
                                    principalInfo[i][0] +
                                    " " +
                                    "\"" + principalInfo[i][1] + "\"",
                            "read");

                if (debug != null) {
                    debug.println("adding SELF permission: " +
                                    newPcp.toString());
                }

                perms.add(newPcp);
            }
        }
    }
    return true;
}
 
Example 2
Source File: AuthPolicyFile.java    From TencentKona-8 with GNU General Public License v2.0 4 votes vote down vote up
/**
 * Returns true if 'Self' permissions were added to the provided
 * 'perms', and false otherwise.
 *
 * <p>
 *
 * @param p check to see if this Permission is a "SELF"
 *                  PrivateCredentialPermission. <p>
 *
 * @param entryCs the codesource for the Policy entry.
 *
 * @param accCs the codesource for from the current AccessControlContext.
 *
 * @param perms the PermissionCollection where the individual
 *                  PrivateCredentialPermissions will be added.
 */
private boolean addSelfPermissions(final Permission p,
                                   CodeSource entryCs,
                                   CodeSource accCs,
                                   Permissions perms) {

    if (!(p instanceof PrivateCredentialPermission)) {
        return false;
    }

    if (!(entryCs instanceof SubjectCodeSource)) {
        return false;
    }

    PrivateCredentialPermission pcp = (PrivateCredentialPermission)p;
    SubjectCodeSource scs = (SubjectCodeSource)entryCs;

    // see if it is a SELF permission
    String[][] pPrincipals = pcp.getPrincipals();
    if (pPrincipals.length <= 0 ||
        !pPrincipals[0][0].equalsIgnoreCase("self") ||
        !pPrincipals[0][1].equalsIgnoreCase("self")) {

        // regular PrivateCredentialPermission
        return false;
    } else {

        // granted a SELF permission - create a
        // PrivateCredentialPermission for each
        // of the Policy entry's CodeSource Principals

        if (scs.getPrincipals() == null) {
            // XXX SubjectCodeSource has no Subject???
            return true;
        }

        for (PrincipalEntry principal : scs.getPrincipals()) {

            //      if the Policy entry's Principal does not contain a
            //              WILDCARD for the Principal name, then a
            //              new PrivateCredentialPermission is created
            //              for the Principal listed in the Policy entry.
            //      if the Policy entry's Principal contains a WILDCARD
            //              for the Principal name, then a new
            //              PrivateCredentialPermission is created
            //              for each Principal associated with the Subject
            //              in the current ACC.

            String[][] principalInfo = getPrincipalInfo(principal, accCs);

            for (int i = 0; i < principalInfo.length; i++) {

                // here's the new PrivateCredentialPermission

                PrivateCredentialPermission newPcp =
                    new PrivateCredentialPermission
                            (pcp.getCredentialClass() +
                                    " " +
                                    principalInfo[i][0] +
                                    " " +
                                    "\"" + principalInfo[i][1] + "\"",
                            "read");

                if (debug != null) {
                    debug.println("adding SELF permission: " +
                                    newPcp.toString());
                }

                perms.add(newPcp);
            }
        }
    }
    return true;
}
 
Example 3
Source File: AuthPolicyFile.java    From jdk8u60 with GNU General Public License v2.0 4 votes vote down vote up
/**
 * Returns true if 'Self' permissions were added to the provided
 * 'perms', and false otherwise.
 *
 * <p>
 *
 * @param p check to see if this Permission is a "SELF"
 *                  PrivateCredentialPermission. <p>
 *
 * @param entryCs the codesource for the Policy entry.
 *
 * @param accCs the codesource for from the current AccessControlContext.
 *
 * @param perms the PermissionCollection where the individual
 *                  PrivateCredentialPermissions will be added.
 */
private boolean addSelfPermissions(final Permission p,
                                   CodeSource entryCs,
                                   CodeSource accCs,
                                   Permissions perms) {

    if (!(p instanceof PrivateCredentialPermission)) {
        return false;
    }

    if (!(entryCs instanceof SubjectCodeSource)) {
        return false;
    }

    PrivateCredentialPermission pcp = (PrivateCredentialPermission)p;
    SubjectCodeSource scs = (SubjectCodeSource)entryCs;

    // see if it is a SELF permission
    String[][] pPrincipals = pcp.getPrincipals();
    if (pPrincipals.length <= 0 ||
        !pPrincipals[0][0].equalsIgnoreCase("self") ||
        !pPrincipals[0][1].equalsIgnoreCase("self")) {

        // regular PrivateCredentialPermission
        return false;
    } else {

        // granted a SELF permission - create a
        // PrivateCredentialPermission for each
        // of the Policy entry's CodeSource Principals

        if (scs.getPrincipals() == null) {
            // XXX SubjectCodeSource has no Subject???
            return true;
        }

        for (PrincipalEntry principal : scs.getPrincipals()) {

            //      if the Policy entry's Principal does not contain a
            //              WILDCARD for the Principal name, then a
            //              new PrivateCredentialPermission is created
            //              for the Principal listed in the Policy entry.
            //      if the Policy entry's Principal contains a WILDCARD
            //              for the Principal name, then a new
            //              PrivateCredentialPermission is created
            //              for each Principal associated with the Subject
            //              in the current ACC.

            String[][] principalInfo = getPrincipalInfo(principal, accCs);

            for (int i = 0; i < principalInfo.length; i++) {

                // here's the new PrivateCredentialPermission

                PrivateCredentialPermission newPcp =
                    new PrivateCredentialPermission
                            (pcp.getCredentialClass() +
                                    " " +
                                    principalInfo[i][0] +
                                    " " +
                                    "\"" + principalInfo[i][1] + "\"",
                            "read");

                if (debug != null) {
                    debug.println("adding SELF permission: " +
                                    newPcp.toString());
                }

                perms.add(newPcp);
            }
        }
    }
    return true;
}
 
Example 4
Source File: AuthPolicyFile.java    From openjdk-jdk8u with GNU General Public License v2.0 4 votes vote down vote up
/**
 * Returns true if 'Self' permissions were added to the provided
 * 'perms', and false otherwise.
 *
 * <p>
 *
 * @param p check to see if this Permission is a "SELF"
 *                  PrivateCredentialPermission. <p>
 *
 * @param entryCs the codesource for the Policy entry.
 *
 * @param accCs the codesource for from the current AccessControlContext.
 *
 * @param perms the PermissionCollection where the individual
 *                  PrivateCredentialPermissions will be added.
 */
private boolean addSelfPermissions(final Permission p,
                                   CodeSource entryCs,
                                   CodeSource accCs,
                                   Permissions perms) {

    if (!(p instanceof PrivateCredentialPermission)) {
        return false;
    }

    if (!(entryCs instanceof SubjectCodeSource)) {
        return false;
    }

    PrivateCredentialPermission pcp = (PrivateCredentialPermission)p;
    SubjectCodeSource scs = (SubjectCodeSource)entryCs;

    // see if it is a SELF permission
    String[][] pPrincipals = pcp.getPrincipals();
    if (pPrincipals.length <= 0 ||
        !pPrincipals[0][0].equalsIgnoreCase("self") ||
        !pPrincipals[0][1].equalsIgnoreCase("self")) {

        // regular PrivateCredentialPermission
        return false;
    } else {

        // granted a SELF permission - create a
        // PrivateCredentialPermission for each
        // of the Policy entry's CodeSource Principals

        if (scs.getPrincipals() == null) {
            // XXX SubjectCodeSource has no Subject???
            return true;
        }

        for (PrincipalEntry principal : scs.getPrincipals()) {

            //      if the Policy entry's Principal does not contain a
            //              WILDCARD for the Principal name, then a
            //              new PrivateCredentialPermission is created
            //              for the Principal listed in the Policy entry.
            //      if the Policy entry's Principal contains a WILDCARD
            //              for the Principal name, then a new
            //              PrivateCredentialPermission is created
            //              for each Principal associated with the Subject
            //              in the current ACC.

            String[][] principalInfo = getPrincipalInfo(principal, accCs);

            for (int i = 0; i < principalInfo.length; i++) {

                // here's the new PrivateCredentialPermission

                PrivateCredentialPermission newPcp =
                    new PrivateCredentialPermission
                            (pcp.getCredentialClass() +
                                    " " +
                                    principalInfo[i][0] +
                                    " " +
                                    "\"" + principalInfo[i][1] + "\"",
                            "read");

                if (debug != null) {
                    debug.println("adding SELF permission: " +
                                    newPcp.toString());
                }

                perms.add(newPcp);
            }
        }
    }
    return true;
}
 
Example 5
Source File: AuthPolicyFile.java    From openjdk-jdk8u-backup with GNU General Public License v2.0 4 votes vote down vote up
/**
 * Returns true if 'Self' permissions were added to the provided
 * 'perms', and false otherwise.
 *
 * <p>
 *
 * @param p check to see if this Permission is a "SELF"
 *                  PrivateCredentialPermission. <p>
 *
 * @param entryCs the codesource for the Policy entry.
 *
 * @param accCs the codesource for from the current AccessControlContext.
 *
 * @param perms the PermissionCollection where the individual
 *                  PrivateCredentialPermissions will be added.
 */
private boolean addSelfPermissions(final Permission p,
                                   CodeSource entryCs,
                                   CodeSource accCs,
                                   Permissions perms) {

    if (!(p instanceof PrivateCredentialPermission)) {
        return false;
    }

    if (!(entryCs instanceof SubjectCodeSource)) {
        return false;
    }

    PrivateCredentialPermission pcp = (PrivateCredentialPermission)p;
    SubjectCodeSource scs = (SubjectCodeSource)entryCs;

    // see if it is a SELF permission
    String[][] pPrincipals = pcp.getPrincipals();
    if (pPrincipals.length <= 0 ||
        !pPrincipals[0][0].equalsIgnoreCase("self") ||
        !pPrincipals[0][1].equalsIgnoreCase("self")) {

        // regular PrivateCredentialPermission
        return false;
    } else {

        // granted a SELF permission - create a
        // PrivateCredentialPermission for each
        // of the Policy entry's CodeSource Principals

        if (scs.getPrincipals() == null) {
            // XXX SubjectCodeSource has no Subject???
            return true;
        }

        for (PrincipalEntry principal : scs.getPrincipals()) {

            //      if the Policy entry's Principal does not contain a
            //              WILDCARD for the Principal name, then a
            //              new PrivateCredentialPermission is created
            //              for the Principal listed in the Policy entry.
            //      if the Policy entry's Principal contains a WILDCARD
            //              for the Principal name, then a new
            //              PrivateCredentialPermission is created
            //              for each Principal associated with the Subject
            //              in the current ACC.

            String[][] principalInfo = getPrincipalInfo(principal, accCs);

            for (int i = 0; i < principalInfo.length; i++) {

                // here's the new PrivateCredentialPermission

                PrivateCredentialPermission newPcp =
                    new PrivateCredentialPermission
                            (pcp.getCredentialClass() +
                                    " " +
                                    principalInfo[i][0] +
                                    " " +
                                    "\"" + principalInfo[i][1] + "\"",
                            "read");

                if (debug != null) {
                    debug.println("adding SELF permission: " +
                                    newPcp.toString());
                }

                perms.add(newPcp);
            }
        }
    }
    return true;
}
 
Example 6
Source File: AuthPolicyFile.java    From openjdk-jdk9 with GNU General Public License v2.0 4 votes vote down vote up
/**
 * Returns true if 'Self' permissions were added to the provided
 * 'perms', and false otherwise.
 *
 * <p>
 *
 * @param p check to see if this Permission is a "SELF"
 *                  PrivateCredentialPermission. <p>
 *
 * @param entryCs the codesource for the Policy entry.
 *
 * @param accCs the codesource for from the current AccessControlContext.
 *
 * @param perms the PermissionCollection where the individual
 *                  PrivateCredentialPermissions will be added.
 */
private boolean addSelfPermissions(final Permission p,
                                   CodeSource entryCs,
                                   CodeSource accCs,
                                   Permissions perms) {

    if (!(p instanceof PrivateCredentialPermission)) {
        return false;
    }

    if (!(entryCs instanceof SubjectCodeSource)) {
        return false;
    }

    PrivateCredentialPermission pcp = (PrivateCredentialPermission)p;
    SubjectCodeSource scs = (SubjectCodeSource)entryCs;

    // see if it is a SELF permission
    String[][] pPrincipals = pcp.getPrincipals();
    if (pPrincipals.length <= 0 ||
        !pPrincipals[0][0].equalsIgnoreCase("self") ||
        !pPrincipals[0][1].equalsIgnoreCase("self")) {

        // regular PrivateCredentialPermission
        return false;
    } else {

        // granted a SELF permission - create a
        // PrivateCredentialPermission for each
        // of the Policy entry's CodeSource Principals

        if (scs.getPrincipals() == null) {
            // XXX SubjectCodeSource has no Subject???
            return true;
        }

        for (PrincipalEntry principal : scs.getPrincipals()) {

            //      if the Policy entry's Principal does not contain a
            //              WILDCARD for the Principal name, then a
            //              new PrivateCredentialPermission is created
            //              for the Principal listed in the Policy entry.
            //      if the Policy entry's Principal contains a WILDCARD
            //              for the Principal name, then a new
            //              PrivateCredentialPermission is created
            //              for each Principal associated with the Subject
            //              in the current ACC.

            String[][] principalInfo = getPrincipalInfo(principal, accCs);

            for (int i = 0; i < principalInfo.length; i++) {

                // here's the new PrivateCredentialPermission

                PrivateCredentialPermission newPcp =
                    new PrivateCredentialPermission
                            (pcp.getCredentialClass() +
                                    " " +
                                    principalInfo[i][0] +
                                    " " +
                                    "\"" + principalInfo[i][1] + "\"",
                            "read");

                if (debug != null) {
                    debug.println("adding SELF permission: " +
                                    newPcp.toString());
                }

                perms.add(newPcp);
            }
        }
    }
    return true;
}
 
Example 7
Source File: AuthPolicyFile.java    From jdk8u-jdk with GNU General Public License v2.0 4 votes vote down vote up
/**
 * Returns true if 'Self' permissions were added to the provided
 * 'perms', and false otherwise.
 *
 * <p>
 *
 * @param p check to see if this Permission is a "SELF"
 *                  PrivateCredentialPermission. <p>
 *
 * @param entryCs the codesource for the Policy entry.
 *
 * @param accCs the codesource for from the current AccessControlContext.
 *
 * @param perms the PermissionCollection where the individual
 *                  PrivateCredentialPermissions will be added.
 */
private boolean addSelfPermissions(final Permission p,
                                   CodeSource entryCs,
                                   CodeSource accCs,
                                   Permissions perms) {

    if (!(p instanceof PrivateCredentialPermission)) {
        return false;
    }

    if (!(entryCs instanceof SubjectCodeSource)) {
        return false;
    }

    PrivateCredentialPermission pcp = (PrivateCredentialPermission)p;
    SubjectCodeSource scs = (SubjectCodeSource)entryCs;

    // see if it is a SELF permission
    String[][] pPrincipals = pcp.getPrincipals();
    if (pPrincipals.length <= 0 ||
        !pPrincipals[0][0].equalsIgnoreCase("self") ||
        !pPrincipals[0][1].equalsIgnoreCase("self")) {

        // regular PrivateCredentialPermission
        return false;
    } else {

        // granted a SELF permission - create a
        // PrivateCredentialPermission for each
        // of the Policy entry's CodeSource Principals

        if (scs.getPrincipals() == null) {
            // XXX SubjectCodeSource has no Subject???
            return true;
        }

        for (PrincipalEntry principal : scs.getPrincipals()) {

            //      if the Policy entry's Principal does not contain a
            //              WILDCARD for the Principal name, then a
            //              new PrivateCredentialPermission is created
            //              for the Principal listed in the Policy entry.
            //      if the Policy entry's Principal contains a WILDCARD
            //              for the Principal name, then a new
            //              PrivateCredentialPermission is created
            //              for each Principal associated with the Subject
            //              in the current ACC.

            String[][] principalInfo = getPrincipalInfo(principal, accCs);

            for (int i = 0; i < principalInfo.length; i++) {

                // here's the new PrivateCredentialPermission

                PrivateCredentialPermission newPcp =
                    new PrivateCredentialPermission
                            (pcp.getCredentialClass() +
                                    " " +
                                    principalInfo[i][0] +
                                    " " +
                                    "\"" + principalInfo[i][1] + "\"",
                            "read");

                if (debug != null) {
                    debug.println("adding SELF permission: " +
                                    newPcp.toString());
                }

                perms.add(newPcp);
            }
        }
    }
    return true;
}
 
Example 8
Source File: AuthPolicyFile.java    From hottub with GNU General Public License v2.0 4 votes vote down vote up
/**
 * Returns true if 'Self' permissions were added to the provided
 * 'perms', and false otherwise.
 *
 * <p>
 *
 * @param p check to see if this Permission is a "SELF"
 *                  PrivateCredentialPermission. <p>
 *
 * @param entryCs the codesource for the Policy entry.
 *
 * @param accCs the codesource for from the current AccessControlContext.
 *
 * @param perms the PermissionCollection where the individual
 *                  PrivateCredentialPermissions will be added.
 */
private boolean addSelfPermissions(final Permission p,
                                   CodeSource entryCs,
                                   CodeSource accCs,
                                   Permissions perms) {

    if (!(p instanceof PrivateCredentialPermission)) {
        return false;
    }

    if (!(entryCs instanceof SubjectCodeSource)) {
        return false;
    }

    PrivateCredentialPermission pcp = (PrivateCredentialPermission)p;
    SubjectCodeSource scs = (SubjectCodeSource)entryCs;

    // see if it is a SELF permission
    String[][] pPrincipals = pcp.getPrincipals();
    if (pPrincipals.length <= 0 ||
        !pPrincipals[0][0].equalsIgnoreCase("self") ||
        !pPrincipals[0][1].equalsIgnoreCase("self")) {

        // regular PrivateCredentialPermission
        return false;
    } else {

        // granted a SELF permission - create a
        // PrivateCredentialPermission for each
        // of the Policy entry's CodeSource Principals

        if (scs.getPrincipals() == null) {
            // XXX SubjectCodeSource has no Subject???
            return true;
        }

        for (PrincipalEntry principal : scs.getPrincipals()) {

            //      if the Policy entry's Principal does not contain a
            //              WILDCARD for the Principal name, then a
            //              new PrivateCredentialPermission is created
            //              for the Principal listed in the Policy entry.
            //      if the Policy entry's Principal contains a WILDCARD
            //              for the Principal name, then a new
            //              PrivateCredentialPermission is created
            //              for each Principal associated with the Subject
            //              in the current ACC.

            String[][] principalInfo = getPrincipalInfo(principal, accCs);

            for (int i = 0; i < principalInfo.length; i++) {

                // here's the new PrivateCredentialPermission

                PrivateCredentialPermission newPcp =
                    new PrivateCredentialPermission
                            (pcp.getCredentialClass() +
                                    " " +
                                    principalInfo[i][0] +
                                    " " +
                                    "\"" + principalInfo[i][1] + "\"",
                            "read");

                if (debug != null) {
                    debug.println("adding SELF permission: " +
                                    newPcp.toString());
                }

                perms.add(newPcp);
            }
        }
    }
    return true;
}
 
Example 9
Source File: AuthPolicyFile.java    From openjdk-8-source with GNU General Public License v2.0 4 votes vote down vote up
/**
 * Returns true if 'Self' permissions were added to the provided
 * 'perms', and false otherwise.
 *
 * <p>
 *
 * @param p check to see if this Permission is a "SELF"
 *                  PrivateCredentialPermission. <p>
 *
 * @param entryCs the codesource for the Policy entry.
 *
 * @param accCs the codesource for from the current AccessControlContext.
 *
 * @param perms the PermissionCollection where the individual
 *                  PrivateCredentialPermissions will be added.
 */
private boolean addSelfPermissions(final Permission p,
                                   CodeSource entryCs,
                                   CodeSource accCs,
                                   Permissions perms) {

    if (!(p instanceof PrivateCredentialPermission)) {
        return false;
    }

    if (!(entryCs instanceof SubjectCodeSource)) {
        return false;
    }

    PrivateCredentialPermission pcp = (PrivateCredentialPermission)p;
    SubjectCodeSource scs = (SubjectCodeSource)entryCs;

    // see if it is a SELF permission
    String[][] pPrincipals = pcp.getPrincipals();
    if (pPrincipals.length <= 0 ||
        !pPrincipals[0][0].equalsIgnoreCase("self") ||
        !pPrincipals[0][1].equalsIgnoreCase("self")) {

        // regular PrivateCredentialPermission
        return false;
    } else {

        // granted a SELF permission - create a
        // PrivateCredentialPermission for each
        // of the Policy entry's CodeSource Principals

        if (scs.getPrincipals() == null) {
            // XXX SubjectCodeSource has no Subject???
            return true;
        }

        for (PrincipalEntry principal : scs.getPrincipals()) {

            //      if the Policy entry's Principal does not contain a
            //              WILDCARD for the Principal name, then a
            //              new PrivateCredentialPermission is created
            //              for the Principal listed in the Policy entry.
            //      if the Policy entry's Principal contains a WILDCARD
            //              for the Principal name, then a new
            //              PrivateCredentialPermission is created
            //              for each Principal associated with the Subject
            //              in the current ACC.

            String[][] principalInfo = getPrincipalInfo(principal, accCs);

            for (int i = 0; i < principalInfo.length; i++) {

                // here's the new PrivateCredentialPermission

                PrivateCredentialPermission newPcp =
                    new PrivateCredentialPermission
                            (pcp.getCredentialClass() +
                                    " " +
                                    principalInfo[i][0] +
                                    " " +
                                    "\"" + principalInfo[i][1] + "\"",
                            "read");

                if (debug != null) {
                    debug.println("adding SELF permission: " +
                                    newPcp.toString());
                }

                perms.add(newPcp);
            }
        }
    }
    return true;
}
 
Example 10
Source File: AuthPolicyFile.java    From openjdk-8 with GNU General Public License v2.0 4 votes vote down vote up
/**
 * Returns true if 'Self' permissions were added to the provided
 * 'perms', and false otherwise.
 *
 * <p>
 *
 * @param p check to see if this Permission is a "SELF"
 *                  PrivateCredentialPermission. <p>
 *
 * @param entryCs the codesource for the Policy entry.
 *
 * @param accCs the codesource for from the current AccessControlContext.
 *
 * @param perms the PermissionCollection where the individual
 *                  PrivateCredentialPermissions will be added.
 */
private boolean addSelfPermissions(final Permission p,
                                   CodeSource entryCs,
                                   CodeSource accCs,
                                   Permissions perms) {

    if (!(p instanceof PrivateCredentialPermission)) {
        return false;
    }

    if (!(entryCs instanceof SubjectCodeSource)) {
        return false;
    }

    PrivateCredentialPermission pcp = (PrivateCredentialPermission)p;
    SubjectCodeSource scs = (SubjectCodeSource)entryCs;

    // see if it is a SELF permission
    String[][] pPrincipals = pcp.getPrincipals();
    if (pPrincipals.length <= 0 ||
        !pPrincipals[0][0].equalsIgnoreCase("self") ||
        !pPrincipals[0][1].equalsIgnoreCase("self")) {

        // regular PrivateCredentialPermission
        return false;
    } else {

        // granted a SELF permission - create a
        // PrivateCredentialPermission for each
        // of the Policy entry's CodeSource Principals

        if (scs.getPrincipals() == null) {
            // XXX SubjectCodeSource has no Subject???
            return true;
        }

        for (PrincipalEntry principal : scs.getPrincipals()) {

            //      if the Policy entry's Principal does not contain a
            //              WILDCARD for the Principal name, then a
            //              new PrivateCredentialPermission is created
            //              for the Principal listed in the Policy entry.
            //      if the Policy entry's Principal contains a WILDCARD
            //              for the Principal name, then a new
            //              PrivateCredentialPermission is created
            //              for each Principal associated with the Subject
            //              in the current ACC.

            String[][] principalInfo = getPrincipalInfo(principal, accCs);

            for (int i = 0; i < principalInfo.length; i++) {

                // here's the new PrivateCredentialPermission

                PrivateCredentialPermission newPcp =
                    new PrivateCredentialPermission
                            (pcp.getCredentialClass() +
                                    " " +
                                    principalInfo[i][0] +
                                    " " +
                                    "\"" + principalInfo[i][1] + "\"",
                            "read");

                if (debug != null) {
                    debug.println("adding SELF permission: " +
                                    newPcp.toString());
                }

                perms.add(newPcp);
            }
        }
    }
    return true;
}
 
Example 11
Source File: AuthPolicyFile.java    From jdk8u_jdk with GNU General Public License v2.0 4 votes vote down vote up
/**
 * Returns true if 'Self' permissions were added to the provided
 * 'perms', and false otherwise.
 *
 * <p>
 *
 * @param p check to see if this Permission is a "SELF"
 *                  PrivateCredentialPermission. <p>
 *
 * @param entryCs the codesource for the Policy entry.
 *
 * @param accCs the codesource for from the current AccessControlContext.
 *
 * @param perms the PermissionCollection where the individual
 *                  PrivateCredentialPermissions will be added.
 */
private boolean addSelfPermissions(final Permission p,
                                   CodeSource entryCs,
                                   CodeSource accCs,
                                   Permissions perms) {

    if (!(p instanceof PrivateCredentialPermission)) {
        return false;
    }

    if (!(entryCs instanceof SubjectCodeSource)) {
        return false;
    }

    PrivateCredentialPermission pcp = (PrivateCredentialPermission)p;
    SubjectCodeSource scs = (SubjectCodeSource)entryCs;

    // see if it is a SELF permission
    String[][] pPrincipals = pcp.getPrincipals();
    if (pPrincipals.length <= 0 ||
        !pPrincipals[0][0].equalsIgnoreCase("self") ||
        !pPrincipals[0][1].equalsIgnoreCase("self")) {

        // regular PrivateCredentialPermission
        return false;
    } else {

        // granted a SELF permission - create a
        // PrivateCredentialPermission for each
        // of the Policy entry's CodeSource Principals

        if (scs.getPrincipals() == null) {
            // XXX SubjectCodeSource has no Subject???
            return true;
        }

        for (PrincipalEntry principal : scs.getPrincipals()) {

            //      if the Policy entry's Principal does not contain a
            //              WILDCARD for the Principal name, then a
            //              new PrivateCredentialPermission is created
            //              for the Principal listed in the Policy entry.
            //      if the Policy entry's Principal contains a WILDCARD
            //              for the Principal name, then a new
            //              PrivateCredentialPermission is created
            //              for each Principal associated with the Subject
            //              in the current ACC.

            String[][] principalInfo = getPrincipalInfo(principal, accCs);

            for (int i = 0; i < principalInfo.length; i++) {

                // here's the new PrivateCredentialPermission

                PrivateCredentialPermission newPcp =
                    new PrivateCredentialPermission
                            (pcp.getCredentialClass() +
                                    " " +
                                    principalInfo[i][0] +
                                    " " +
                                    "\"" + principalInfo[i][1] + "\"",
                            "read");

                if (debug != null) {
                    debug.println("adding SELF permission: " +
                                    newPcp.toString());
                }

                perms.add(newPcp);
            }
        }
    }
    return true;
}
 
Example 12
Source File: AuthPolicyFile.java    From jdk8u-jdk with GNU General Public License v2.0 4 votes vote down vote up
/**
 * Returns true if 'Self' permissions were added to the provided
 * 'perms', and false otherwise.
 *
 * <p>
 *
 * @param p check to see if this Permission is a "SELF"
 *                  PrivateCredentialPermission. <p>
 *
 * @param entryCs the codesource for the Policy entry.
 *
 * @param accCs the codesource for from the current AccessControlContext.
 *
 * @param perms the PermissionCollection where the individual
 *                  PrivateCredentialPermissions will be added.
 */
private boolean addSelfPermissions(final Permission p,
                                   CodeSource entryCs,
                                   CodeSource accCs,
                                   Permissions perms) {

    if (!(p instanceof PrivateCredentialPermission)) {
        return false;
    }

    if (!(entryCs instanceof SubjectCodeSource)) {
        return false;
    }

    PrivateCredentialPermission pcp = (PrivateCredentialPermission)p;
    SubjectCodeSource scs = (SubjectCodeSource)entryCs;

    // see if it is a SELF permission
    String[][] pPrincipals = pcp.getPrincipals();
    if (pPrincipals.length <= 0 ||
        !pPrincipals[0][0].equalsIgnoreCase("self") ||
        !pPrincipals[0][1].equalsIgnoreCase("self")) {

        // regular PrivateCredentialPermission
        return false;
    } else {

        // granted a SELF permission - create a
        // PrivateCredentialPermission for each
        // of the Policy entry's CodeSource Principals

        if (scs.getPrincipals() == null) {
            // XXX SubjectCodeSource has no Subject???
            return true;
        }

        for (PrincipalEntry principal : scs.getPrincipals()) {

            //      if the Policy entry's Principal does not contain a
            //              WILDCARD for the Principal name, then a
            //              new PrivateCredentialPermission is created
            //              for the Principal listed in the Policy entry.
            //      if the Policy entry's Principal contains a WILDCARD
            //              for the Principal name, then a new
            //              PrivateCredentialPermission is created
            //              for each Principal associated with the Subject
            //              in the current ACC.

            String[][] principalInfo = getPrincipalInfo(principal, accCs);

            for (int i = 0; i < principalInfo.length; i++) {

                // here's the new PrivateCredentialPermission

                PrivateCredentialPermission newPcp =
                    new PrivateCredentialPermission
                            (pcp.getCredentialClass() +
                                    " " +
                                    principalInfo[i][0] +
                                    " " +
                                    "\"" + principalInfo[i][1] + "\"",
                            "read");

                if (debug != null) {
                    debug.println("adding SELF permission: " +
                                    newPcp.toString());
                }

                perms.add(newPcp);
            }
        }
    }
    return true;
}
 
Example 13
Source File: AuthPolicyFile.java    From jdk8u-dev-jdk with GNU General Public License v2.0 4 votes vote down vote up
/**
 * Returns true if 'Self' permissions were added to the provided
 * 'perms', and false otherwise.
 *
 * <p>
 *
 * @param p check to see if this Permission is a "SELF"
 *                  PrivateCredentialPermission. <p>
 *
 * @param entryCs the codesource for the Policy entry.
 *
 * @param accCs the codesource for from the current AccessControlContext.
 *
 * @param perms the PermissionCollection where the individual
 *                  PrivateCredentialPermissions will be added.
 */
private boolean addSelfPermissions(final Permission p,
                                   CodeSource entryCs,
                                   CodeSource accCs,
                                   Permissions perms) {

    if (!(p instanceof PrivateCredentialPermission)) {
        return false;
    }

    if (!(entryCs instanceof SubjectCodeSource)) {
        return false;
    }

    PrivateCredentialPermission pcp = (PrivateCredentialPermission)p;
    SubjectCodeSource scs = (SubjectCodeSource)entryCs;

    // see if it is a SELF permission
    String[][] pPrincipals = pcp.getPrincipals();
    if (pPrincipals.length <= 0 ||
        !pPrincipals[0][0].equalsIgnoreCase("self") ||
        !pPrincipals[0][1].equalsIgnoreCase("self")) {

        // regular PrivateCredentialPermission
        return false;
    } else {

        // granted a SELF permission - create a
        // PrivateCredentialPermission for each
        // of the Policy entry's CodeSource Principals

        if (scs.getPrincipals() == null) {
            // XXX SubjectCodeSource has no Subject???
            return true;
        }

        for (PrincipalEntry principal : scs.getPrincipals()) {

            //      if the Policy entry's Principal does not contain a
            //              WILDCARD for the Principal name, then a
            //              new PrivateCredentialPermission is created
            //              for the Principal listed in the Policy entry.
            //      if the Policy entry's Principal contains a WILDCARD
            //              for the Principal name, then a new
            //              PrivateCredentialPermission is created
            //              for each Principal associated with the Subject
            //              in the current ACC.

            String[][] principalInfo = getPrincipalInfo(principal, accCs);

            for (int i = 0; i < principalInfo.length; i++) {

                // here's the new PrivateCredentialPermission

                PrivateCredentialPermission newPcp =
                    new PrivateCredentialPermission
                            (pcp.getCredentialClass() +
                                    " " +
                                    principalInfo[i][0] +
                                    " " +
                                    "\"" + principalInfo[i][1] + "\"",
                            "read");

                if (debug != null) {
                    debug.println("adding SELF permission: " +
                                    newPcp.toString());
                }

                perms.add(newPcp);
            }
        }
    }
    return true;
}