Example usage for org.springframework.security.acls.afterinvocation AbstractAclProvider subclass-usage

List of usage examples for org.springframework.security.acls.afterinvocation AbstractAclProvider subclass-usage

Introduction

In this page you can find the example usage for org.springframework.security.acls.afterinvocation AbstractAclProvider subclass-usage.

Usage

From source file org.springframework.security.acls.afterinvocation.AclEntryAfterInvocationCollectionFilteringProvider.java

/**
 * <p>
 * Given a <code>Collection</code> of domain object instances returned from a secure
 * object invocation, remove any <code>Collection</code> elements the principal does not
 * have appropriate permission to access as defined by the {@link AclService}.
 * <p>

From source file org.springframework.security.acls.afterinvocation.AclEntryAfterInvocationProvider.java

/**
 * Given a domain object instance returned from a secure object invocation, ensures the
 * principal has appropriate permission as defined by the {@link AclService}.
 * <p>
 * The <code>AclService</code> is used to retrieve the access control list (ACL)
 * permissions associated with a domain object instance for the current

From source file ubic.gemma.security.authorization.acl.AclAfterInvocationMapValueFilteringProvider.java

/**
 * Filter a one-to-one map where the keys are NON-SECURABLE and the values ARE securable (or at least, can be). The
 * values can be a mixture of securable or non-securable. If you are using a map where both they keys and values are
 * securable, use {@link AclAfterInvocationMapFilteringProvider}
 * 
 * @author paul

From source file ubic.gemma.security.authorization.acl.AclAfterInvocationMapFilteringProvider.java

/**
 * Like the AclEntryAfterInvocationCollectionFilteringProvider, but filters on the keys AND values of a Map, where the
 * keys are Securable and the values MAY be Securable. If your keys are non-securable, use
 * {@link AclAfterInvocationMapValueFilteringProvider}
 * 
 * @see org.springframework.security.acls.afterinvocation.AclEntryAfterInvocationCollectionFilteringProvider

From source file ubic.gemma.security.authorization.acl.ByAssociationFilteringProvider.java

/**
 * Subclass this when you want to filter collections based not on the security of the object itself, but by an
 * associated object. For example, a collection of CompositeSequences is filtered based on security of the associated
 * ArrayDesign.
 * 
 * @author Paul

From source file ubic.gemma.security.authorization.acl.AclAfterFilterCollectionForUserOwnedData.java

/**
 * Keep everything that the user owns. Entities shared with this user but owned by another user will be filtered out.
 * 
 * @author thea
 * @version $Id: AclAfterFilterCollectionForUserOwnedData.java,v 1.2 2012/05/27 02:58:03 paul Exp $
 * @see AfterInvocationProvider

From source file ubic.gemma.security.authorization.acl.AclAfterFilterCollectionForMyData.java

/**
 * Filter out public {@link Securables}s, leaving only ones that the user owns and can edit. This is used for the
 * "my data" list. Data sets that are only readable are omitted.
 * 
 * @author keshav
 * @version $Id: AclAfterFilterCollectionForMyData.java,v 1.8 2012/05/27 02:58:03 paul Exp $

From source file ubic.gemma.security.authorization.acl.AclAfterFilterCollectionForMyPrivateData.java

/**
 * Filter out public {@link Securables}s, leaving only ones that the user specifically can view but aren't public. This
 * includes data sets that are read-only for the user, e.g. shared by another user
 * 
 * @author keshav
 * @version $Id: AclAfterFilterCollectionForMyPrivateData.java,v 1.3 2012/05/27 02:58:02 paul Exp $

From source file ubic.gemma.security.authorization.acl.AclAfterFilterValueObjectCollectionProvider.java

/**
 * Security check for reading value objects.
 * <p>
 * As a side effect, it fills in security status information in the value objects, but only if permission was granted.
 * 
 * @author cmcdonald