List of usage examples for org.springframework.security.acls.afterinvocation AbstractAclProvider subclass-usage
From source file org.springframework.security.acls.afterinvocation.AclEntryAfterInvocationCollectionFilteringProvider.java
/**
* <p>
* Given a <code>Collection</code> of domain object instances returned from a secure
* object invocation, remove any <code>Collection</code> elements the principal does not
* have appropriate permission to access as defined by the {@link AclService}.
* <p>
From source file org.springframework.security.acls.afterinvocation.AclEntryAfterInvocationProvider.java
/**
* Given a domain object instance returned from a secure object invocation, ensures the
* principal has appropriate permission as defined by the {@link AclService}.
* <p>
* The <code>AclService</code> is used to retrieve the access control list (ACL)
* permissions associated with a domain object instance for the current
From source file ubic.gemma.security.authorization.acl.AclAfterInvocationMapValueFilteringProvider.java
/**
* Filter a one-to-one map where the keys are NON-SECURABLE and the values ARE securable (or at least, can be). The
* values can be a mixture of securable or non-securable. If you are using a map where both they keys and values are
* securable, use {@link AclAfterInvocationMapFilteringProvider}
*
* @author paul
From source file ubic.gemma.security.authorization.acl.AclAfterInvocationMapFilteringProvider.java
/**
* Like the AclEntryAfterInvocationCollectionFilteringProvider, but filters on the keys AND values of a Map, where the
* keys are Securable and the values MAY be Securable. If your keys are non-securable, use
* {@link AclAfterInvocationMapValueFilteringProvider}
*
* @see org.springframework.security.acls.afterinvocation.AclEntryAfterInvocationCollectionFilteringProvider
From source file ubic.gemma.security.authorization.acl.ByAssociationFilteringProvider.java
/**
* Subclass this when you want to filter collections based not on the security of the object itself, but by an
* associated object. For example, a collection of CompositeSequences is filtered based on security of the associated
* ArrayDesign.
*
* @author Paul
From source file ubic.gemma.security.authorization.acl.AclAfterFilterCollectionForUserOwnedData.java
/**
* Keep everything that the user owns. Entities shared with this user but owned by another user will be filtered out.
*
* @author thea
* @version $Id: AclAfterFilterCollectionForUserOwnedData.java,v 1.2 2012/05/27 02:58:03 paul Exp $
* @see AfterInvocationProvider
From source file ubic.gemma.security.authorization.acl.AclAfterFilterCollectionForMyData.java
/**
* Filter out public {@link Securables}s, leaving only ones that the user owns and can edit. This is used for the
* "my data" list. Data sets that are only readable are omitted.
*
* @author keshav
* @version $Id: AclAfterFilterCollectionForMyData.java,v 1.8 2012/05/27 02:58:03 paul Exp $
From source file ubic.gemma.security.authorization.acl.AclAfterFilterCollectionForMyPrivateData.java
/**
* Filter out public {@link Securables}s, leaving only ones that the user specifically can view but aren't public. This
* includes data sets that are read-only for the user, e.g. shared by another user
*
* @author keshav
* @version $Id: AclAfterFilterCollectionForMyPrivateData.java,v 1.3 2012/05/27 02:58:02 paul Exp $
From source file ubic.gemma.security.authorization.acl.AclAfterFilterValueObjectCollectionProvider.java
/**
* Security check for reading value objects.
* <p>
* As a side effect, it fills in security status information in the value objects, but only if permission was granted.
*
* @author cmcdonald