mirror of
https://github.com/spring-projects/spring-security.git
synced 2025-09-08 20:51:41 +00:00
Polish gh-10081
This commit is contained in:
parent
86193b9540
commit
74e3abc992
@ -35,7 +35,6 @@ import org.springframework.core.convert.ConversionException;
|
|||||||
import org.springframework.core.convert.ConversionService;
|
import org.springframework.core.convert.ConversionService;
|
||||||
import org.springframework.jdbc.core.JdbcTemplate;
|
import org.springframework.jdbc.core.JdbcTemplate;
|
||||||
import org.springframework.jdbc.core.ResultSetExtractor;
|
import org.springframework.jdbc.core.ResultSetExtractor;
|
||||||
import org.springframework.security.acls.domain.*;
|
|
||||||
import org.springframework.security.acls.domain.AccessControlEntryImpl;
|
import org.springframework.security.acls.domain.AccessControlEntryImpl;
|
||||||
import org.springframework.security.acls.domain.AclAuthorizationStrategy;
|
import org.springframework.security.acls.domain.AclAuthorizationStrategy;
|
||||||
import org.springframework.security.acls.domain.AclImpl;
|
import org.springframework.security.acls.domain.AclImpl;
|
||||||
@ -43,6 +42,7 @@ import org.springframework.security.acls.domain.AuditLogger;
|
|||||||
import org.springframework.security.acls.domain.DefaultPermissionFactory;
|
import org.springframework.security.acls.domain.DefaultPermissionFactory;
|
||||||
import org.springframework.security.acls.domain.DefaultPermissionGrantingStrategy;
|
import org.springframework.security.acls.domain.DefaultPermissionGrantingStrategy;
|
||||||
import org.springframework.security.acls.domain.GrantedAuthoritySid;
|
import org.springframework.security.acls.domain.GrantedAuthoritySid;
|
||||||
|
import org.springframework.security.acls.domain.ObjectIdentityRetrievalStrategyImpl;
|
||||||
import org.springframework.security.acls.domain.PermissionFactory;
|
import org.springframework.security.acls.domain.PermissionFactory;
|
||||||
import org.springframework.security.acls.domain.PrincipalSid;
|
import org.springframework.security.acls.domain.PrincipalSid;
|
||||||
import org.springframework.security.acls.model.AccessControlEntry;
|
import org.springframework.security.acls.model.AccessControlEntry;
|
||||||
@ -137,7 +137,6 @@ public class BasicLookupStrategy implements LookupStrategy {
|
|||||||
|
|
||||||
private AclClassIdUtils aclClassIdUtils;
|
private AclClassIdUtils aclClassIdUtils;
|
||||||
|
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Constructor accepting mandatory arguments
|
* Constructor accepting mandatory arguments
|
||||||
* @param dataSource to access the database
|
* @param dataSource to access the database
|
||||||
@ -158,7 +157,6 @@ public class BasicLookupStrategy implements LookupStrategy {
|
|||||||
*/
|
*/
|
||||||
public BasicLookupStrategy(DataSource dataSource, AclCache aclCache,
|
public BasicLookupStrategy(DataSource dataSource, AclCache aclCache,
|
||||||
AclAuthorizationStrategy aclAuthorizationStrategy, PermissionGrantingStrategy grantingStrategy) {
|
AclAuthorizationStrategy aclAuthorizationStrategy, PermissionGrantingStrategy grantingStrategy) {
|
||||||
|
|
||||||
Assert.notNull(dataSource, "DataSource required");
|
Assert.notNull(dataSource, "DataSource required");
|
||||||
Assert.notNull(aclCache, "AclCache required");
|
Assert.notNull(aclCache, "AclCache required");
|
||||||
Assert.notNull(aclAuthorizationStrategy, "AclAuthorizationStrategy required");
|
Assert.notNull(aclAuthorizationStrategy, "AclAuthorizationStrategy required");
|
||||||
@ -494,8 +492,8 @@ public class BasicLookupStrategy implements LookupStrategy {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
public void setObjectIdentityGenerator(ObjectIdentityGenerator objectIdentityGenerator) {
|
public final void setObjectIdentityGenerator(ObjectIdentityGenerator objectIdentityGenerator) {
|
||||||
Assert.notNull(objectIdentityGenerator,"The provided strategy has to be not null!");
|
Assert.notNull(objectIdentityGenerator, "objectIdentityGenerator cannot be null");
|
||||||
this.objectIdentityGenerator = objectIdentityGenerator;
|
this.objectIdentityGenerator = objectIdentityGenerator;
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -580,7 +578,8 @@ public class BasicLookupStrategy implements LookupStrategy {
|
|||||||
// target id type, e.g. UUID.
|
// target id type, e.g. UUID.
|
||||||
Serializable identifier = (Serializable) rs.getObject("object_id_identity");
|
Serializable identifier = (Serializable) rs.getObject("object_id_identity");
|
||||||
identifier = BasicLookupStrategy.this.aclClassIdUtils.identifierFrom(identifier, rs);
|
identifier = BasicLookupStrategy.this.aclClassIdUtils.identifierFrom(identifier, rs);
|
||||||
ObjectIdentity objectIdentity = objectIdentityGenerator.createObjectIdentity(identifier,rs.getString("class"));
|
ObjectIdentity objectIdentity = BasicLookupStrategy.this.objectIdentityGenerator
|
||||||
|
.createObjectIdentity(identifier, rs.getString("class"));
|
||||||
|
|
||||||
Acl parentAcl = null;
|
Acl parentAcl = null;
|
||||||
long parentAclId = rs.getLong("parent_object");
|
long parentAclId = rs.getLong("parent_object");
|
||||||
|
@ -81,6 +81,7 @@ public class JdbcAclService implements AclService {
|
|||||||
private String findChildrenSql = DEFAULT_SELECT_ACL_WITH_PARENT_SQL;
|
private String findChildrenSql = DEFAULT_SELECT_ACL_WITH_PARENT_SQL;
|
||||||
|
|
||||||
private AclClassIdUtils aclClassIdUtils;
|
private AclClassIdUtils aclClassIdUtils;
|
||||||
|
|
||||||
private ObjectIdentityGenerator objectIdentityGenerator;
|
private ObjectIdentityGenerator objectIdentityGenerator;
|
||||||
|
|
||||||
public JdbcAclService(DataSource dataSource, LookupStrategy lookupStrategy) {
|
public JdbcAclService(DataSource dataSource, LookupStrategy lookupStrategy) {
|
||||||
@ -92,8 +93,8 @@ public class JdbcAclService implements AclService {
|
|||||||
Assert.notNull(lookupStrategy, "LookupStrategy required");
|
Assert.notNull(lookupStrategy, "LookupStrategy required");
|
||||||
this.jdbcOperations = jdbcOperations;
|
this.jdbcOperations = jdbcOperations;
|
||||||
this.lookupStrategy = lookupStrategy;
|
this.lookupStrategy = lookupStrategy;
|
||||||
this.objectIdentityGenerator = new ObjectIdentityRetrievalStrategyImpl();
|
|
||||||
this.aclClassIdUtils = new AclClassIdUtils();
|
this.aclClassIdUtils = new AclClassIdUtils();
|
||||||
|
this.objectIdentityGenerator = new ObjectIdentityRetrievalStrategyImpl();
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
@ -108,7 +109,7 @@ public class JdbcAclService implements AclService {
|
|||||||
String javaType = rs.getString("class");
|
String javaType = rs.getString("class");
|
||||||
Serializable identifier = (Serializable) rs.getObject("obj_id");
|
Serializable identifier = (Serializable) rs.getObject("obj_id");
|
||||||
identifier = this.aclClassIdUtils.identifierFrom(identifier, rs);
|
identifier = this.aclClassIdUtils.identifierFrom(identifier, rs);
|
||||||
return objectIdentityGenerator.createObjectIdentity(identifier, javaType);
|
return this.objectIdentityGenerator.createObjectIdentity(identifier, javaType);
|
||||||
}
|
}
|
||||||
|
|
||||||
@Override
|
@Override
|
||||||
@ -145,7 +146,6 @@ public class JdbcAclService implements AclService {
|
|||||||
|
|
||||||
/**
|
/**
|
||||||
* Allows customization of the SQL query used to find child object identities.
|
* Allows customization of the SQL query used to find child object identities.
|
||||||
*
|
|
||||||
* @param findChildrenSql
|
* @param findChildrenSql
|
||||||
*/
|
*/
|
||||||
public void setFindChildrenQuery(String findChildrenSql) {
|
public void setFindChildrenQuery(String findChildrenSql) {
|
||||||
@ -158,7 +158,8 @@ public class JdbcAclService implements AclService {
|
|||||||
// Change the default children select if it hasn't been overridden
|
// Change the default children select if it hasn't been overridden
|
||||||
if (this.findChildrenSql.equals(DEFAULT_SELECT_ACL_WITH_PARENT_SQL)) {
|
if (this.findChildrenSql.equals(DEFAULT_SELECT_ACL_WITH_PARENT_SQL)) {
|
||||||
this.findChildrenSql = DEFAULT_SELECT_ACL_WITH_PARENT_SQL_WITH_CLASS_ID_TYPE;
|
this.findChildrenSql = DEFAULT_SELECT_ACL_WITH_PARENT_SQL_WITH_CLASS_ID_TYPE;
|
||||||
} else {
|
}
|
||||||
|
else {
|
||||||
log.debug("Find children statement has already been overridden, so not overridding the default");
|
log.debug("Find children statement has already been overridden, so not overridding the default");
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -169,7 +170,7 @@ public class JdbcAclService implements AclService {
|
|||||||
}
|
}
|
||||||
|
|
||||||
public void setObjectIdentityGenerator(ObjectIdentityGenerator objectIdentityGenerator) {
|
public void setObjectIdentityGenerator(ObjectIdentityGenerator objectIdentityGenerator) {
|
||||||
Assert.notNull(objectIdentityGenerator,"The provided strategy has to be not null!");
|
Assert.notNull(objectIdentityGenerator, "objectIdentityGenerator cannot be null");
|
||||||
this.objectIdentityGenerator = objectIdentityGenerator;
|
this.objectIdentityGenerator = objectIdentityGenerator;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -320,6 +320,15 @@ public abstract class AbstractBasicLookupStrategyTests {
|
|||||||
assertThat(((GrantedAuthoritySid) result).getGrantedAuthority()).isEqualTo("sid");
|
assertThat(((GrantedAuthoritySid) result).getGrantedAuthority()).isEqualTo("sid");
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void setObjectIdentityGeneratorWhenNullThenThrowsIllegalArgumentException() {
|
||||||
|
// @formatter:off
|
||||||
|
assertThatIllegalArgumentException()
|
||||||
|
.isThrownBy(() -> this.strategy.setObjectIdentityGenerator(null))
|
||||||
|
.withMessage("objectIdentityGenerator cannot be null");
|
||||||
|
// @formatter:on
|
||||||
|
}
|
||||||
|
|
||||||
private static final class CacheManagerMock {
|
private static final class CacheManagerMock {
|
||||||
|
|
||||||
private final List<String> cacheNames;
|
private final List<String> cacheNames;
|
||||||
|
@ -45,6 +45,7 @@ import org.springframework.security.acls.model.Sid;
|
|||||||
|
|
||||||
import static org.assertj.core.api.Assertions.assertThat;
|
import static org.assertj.core.api.Assertions.assertThat;
|
||||||
import static org.assertj.core.api.Assertions.assertThatExceptionOfType;
|
import static org.assertj.core.api.Assertions.assertThatExceptionOfType;
|
||||||
|
import static org.assertj.core.api.Assertions.assertThatIllegalArgumentException;
|
||||||
import static org.mockito.ArgumentMatchers.any;
|
import static org.mockito.ArgumentMatchers.any;
|
||||||
import static org.mockito.ArgumentMatchers.anyList;
|
import static org.mockito.ArgumentMatchers.anyList;
|
||||||
import static org.mockito.ArgumentMatchers.anyString;
|
import static org.mockito.ArgumentMatchers.anyString;
|
||||||
@ -170,6 +171,26 @@ public class JdbcAclServiceTests {
|
|||||||
.isEqualTo(UUID.fromString("25d93b3f-c3aa-4814-9d5e-c7c96ced7762"));
|
.isEqualTo(UUID.fromString("25d93b3f-c3aa-4814-9d5e-c7c96ced7762"));
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void setObjectIdentityGeneratorWhenNullThenThrowsIllegalArgumentException() {
|
||||||
|
assertThatIllegalArgumentException()
|
||||||
|
.isThrownBy(() -> this.aclServiceIntegration.setObjectIdentityGenerator(null))
|
||||||
|
.withMessage("objectIdentityGenerator cannot be null");
|
||||||
|
}
|
||||||
|
|
||||||
|
@Test
|
||||||
|
public void findChildrenWhenObjectIdentityGeneratorSetThenUsed() {
|
||||||
|
this.aclServiceIntegration
|
||||||
|
.setObjectIdentityGenerator((id, type) -> new ObjectIdentityImpl(type, "prefix:" + id));
|
||||||
|
|
||||||
|
ObjectIdentity objectIdentity = new ObjectIdentityImpl("location", "US");
|
||||||
|
this.aclServiceIntegration.setAclClassIdSupported(true);
|
||||||
|
List<ObjectIdentity> objectIdentities = this.aclServiceIntegration.findChildren(objectIdentity);
|
||||||
|
assertThat(objectIdentities.size()).isEqualTo(1);
|
||||||
|
assertThat(objectIdentities.get(0).getType()).isEqualTo("location");
|
||||||
|
assertThat(objectIdentities.get(0).getIdentifier()).isEqualTo("prefix:US-PAL");
|
||||||
|
}
|
||||||
|
|
||||||
class MockLongIdDomainObject {
|
class MockLongIdDomainObject {
|
||||||
|
|
||||||
private Object id;
|
private Object id;
|
||||||
|
Loading…
x
Reference in New Issue
Block a user