Interface JackrabbitAccessControlManager
-
- All Superinterfaces:
AccessControlManager
- All Known Implementing Classes:
AbstractAccessControlManager
,AccessControlManagerImpl
,JackrabbitAccessControlManagerDelegator
@ProviderType public interface JackrabbitAccessControlManager extends AccessControlManager
JackrabbitAccessControlManager
provides extensions to theAccessControlManager
interface.
-
-
Method Summary
All Methods Instance Methods Abstract Methods Default Methods Modifier and Type Method Description @NotNull JackrabbitAccessControlPolicy[]
getApplicablePolicies(@NotNull Principal principal)
Returns the applicable policies for the specifiedprincipal
or an empty array if no additional policies can be applied.@NotNull AccessControlPolicy[]
getEffectivePolicies(@NotNull Set<Principal> principals)
Returns theAccessControlPolicy
objects that are in effect for the givenPrincipal
s.default @NotNull Iterator<AccessControlPolicy>
getEffectivePolicies(@NotNull Set<Principal> principals, @Nullable String... absPaths)
Returns theAccessControlPolicy
objects that are in effect for the givenPrincipal
s at the specified absolute paths.@NotNull JackrabbitAccessControlPolicy[]
getPolicies(@NotNull Principal principal)
Returns theAccessControlPolicy
objects that have been set for the givenprincipal
or an empty array if no policy has been set.default @NotNull PrivilegeCollection
getPrivilegeCollection(@Nullable String absPath)
Returns thePrivilegeCollection
for editing session at the given absolute path, which must be an existing node.default @NotNull PrivilegeCollection
getPrivilegeCollection(@Nullable String absPath, @NotNull Set<Principal> principals)
Returns thePrivilegeCollection
for the given set of principals at the given absolute path, which must be an existing node.@NotNull Privilege[]
getPrivileges(@Nullable String absPath, @NotNull Set<Principal> principals)
Returns the privileges the given set ofPrincipal
s has for absolute pathabsPath
, which must be an existing node.boolean
hasPrivileges(@Nullable String absPath, @NotNull Set<Principal> principals, @NotNull Privilege[] privileges)
Returns whether the given set ofPrincipal
s has the specified privileges for absolute pathabsPath
, which must be an existing node.default @NotNull PrivilegeCollection
privilegeCollectionFromNames(@NotNull String... privilegeNames)
Returns thePrivilegeCollection
for the specifiedprivilegeNames
.-
Methods inherited from interface javax.jcr.security.AccessControlManager
getApplicablePolicies, getEffectivePolicies, getPolicies, getPrivileges, getSupportedPrivileges, hasPrivileges, privilegeFromName, removePolicy, setPolicy
-
-
-
-
Method Detail
-
getApplicablePolicies
@NotNull @NotNull JackrabbitAccessControlPolicy[] getApplicablePolicies(@NotNull @NotNull Principal principal) throws AccessDeniedException, AccessControlException, UnsupportedRepositoryOperationException, RepositoryException
Returns the applicable policies for the specifiedprincipal
or an empty array if no additional policies can be applied.- Parameters:
principal
- A principal known to the editing session.- Returns:
- array of policies for the specified
principal
. Note that the policy object returned must reveal the path of the node where they can be applied later on usingAccessControlManager.setPolicy(String, javax.jcr.security.AccessControlPolicy)
. - Throws:
AccessDeniedException
- if the session lacksMODIFY_ACCESS_CONTROL
privilege.AccessControlException
- if the specified principal does not exist or if another access control related exception occurs.UnsupportedRepositoryOperationException
- if editing access control policies by principal is not supported.RepositoryException
- if another error occurs.- See Also:
JackrabbitAccessControlPolicy.getPath()
-
getPolicies
@NotNull @NotNull JackrabbitAccessControlPolicy[] getPolicies(@NotNull @NotNull Principal principal) throws AccessDeniedException, AccessControlException, UnsupportedRepositoryOperationException, RepositoryException
Returns theAccessControlPolicy
objects that have been set for the givenprincipal
or an empty array if no policy has been set. This method reflects the binding state, including transient policy modifications.- Parameters:
principal
- A valid principal.- Returns:
- The policies defined for the given principal or an empty array.
- Throws:
AccessDeniedException
- if the session lacksREAD_ACCESS_CONTROL
privilege.AccessControlException
- if the specified principal does not exist or if another access control related exception occurs.UnsupportedRepositoryOperationException
- if editing access control policies by principal is not supported.RepositoryException
- If another error occurs.
-
getEffectivePolicies
@NotNull @NotNull AccessControlPolicy[] getEffectivePolicies(@NotNull @NotNull Set<Principal> principals) throws AccessDeniedException, AccessControlException, UnsupportedRepositoryOperationException, RepositoryException
Returns theAccessControlPolicy
objects that are in effect for the givenPrincipal
s. This may be policies set through this API or some implementation specific (default) policies.- Parameters:
principals
- A set of valid principals.- Returns:
- The policies defined for the given principal or an empty array.
- Throws:
AccessDeniedException
- if the session lacksREAD_ACCESS_CONTROL
privilege.AccessControlException
- if the specified principal does not exist or if another access control related exception occurs.UnsupportedRepositoryOperationException
- if editing access control policies by principal is not supported.RepositoryException
- If another error occurs.
-
getEffectivePolicies
@NotNull default @NotNull Iterator<AccessControlPolicy> getEffectivePolicies(@NotNull @NotNull Set<Principal> principals, @Nullable @Nullable String... absPaths) throws AccessDeniedException, AccessControlException, UnsupportedRepositoryOperationException, RepositoryException
Returns theAccessControlPolicy
objects that are in effect for the givenPrincipal
s at the specified absolute paths. This may be policies set through this API or some implementation specific (default) policies. Note, that this method will make a best effort approach to reflect the effects of the existing access control setup. For backwards compatibility this new method comes with a default implementation that callsgetEffectivePolicies(Set)
followed by a best effort approach to determine effect on any of specified paths, which does not take the effect of restrictions into account.- Parameters:
principals
- A set of valid principals for which the effective policies should be computed.absPaths
- The absolute paths for which the effective policies should be computed. In contrast toAccessControlManager.getEffectivePolicies(String)
this method does not mandate the paths to point to existing nodes.- Returns:
- The policies defined for the given principal or an empty iterator.
- Throws:
AccessDeniedException
- if the session lacksREAD_ACCESS_CONTROL
privilege to retrieve the information for the given principals or paths.AccessControlException
- if the specified principal does not exist or if another access control related exception occurs.UnsupportedRepositoryOperationException
- if editing access control policies by principal or path is not supported or if this method is not implemented.RepositoryException
- If another error occurs.- Since:
- Oak 1.52.0
-
hasPrivileges
boolean hasPrivileges(@Nullable @Nullable String absPath, @NotNull @NotNull Set<Principal> principals, @NotNull @NotNull Privilege[] privileges) throws PathNotFoundException, AccessDeniedException, RepositoryException
Returns whether the given set ofPrincipal
s has the specified privileges for absolute pathabsPath
, which must be an existing node.Testing an aggregate privilege is equivalent to testing each non aggregate privilege among the set returned by calling
Privilege.getAggregatePrivileges()
for that privilege.The results reported by the this method reflect the net effect of the currently applied control mechanisms. It does not reflect unsaved access control policies or unsaved access control entries. Changes to access control status caused by these mechanisms only take effect on
Session.save()
and are only then reflected in the results of the privilege test methods.Since this method allows to view the privileges of principals other than included in the editing session, this method must throw
AccessDeniedException
if the session lacksREAD_ACCESS_CONTROL
privilege for theabsPath
node.- Parameters:
absPath
- an absolute path.principals
- a set ofPrincipal
s for which is the given privileges are tested.privileges
- an array ofPrivilege
s.- Returns:
true
if the session has the specified privileges;false
otherwise.- Throws:
PathNotFoundException
- if no node atabsPath
exists or the session does not have sufficient access to retrieve a node at that location.AccessDeniedException
- if the session lacksREAD_ACCESS_CONTROL
privilege for theabsPath
node.RepositoryException
- if another error occurs.
-
getPrivileges
@NotNull @NotNull Privilege[] getPrivileges(@Nullable @Nullable String absPath, @NotNull @NotNull Set<Principal> principals) throws PathNotFoundException, AccessDeniedException, RepositoryException
Returns the privileges the given set ofPrincipal
s has for absolute pathabsPath
, which must be an existing node.The returned privileges are those for which
hasPrivileges(java.lang.String, java.util.Set<java.security.Principal>, javax.jcr.security.Privilege[])
would returntrue
.The results reported by the this method reflect the net effect of the currently applied control mechanisms. It does not reflect unsaved access control policies or unsaved access control entries. Changes to access control status caused by these mechanisms only take effect on
Session.save()
and are only then reflected in the results of the privilege test methods.Since this method allows to view the privileges of principals other than included in the editing session, this method must throw
AccessDeniedException
if the session lacksREAD_ACCESS_CONTROL
privilege for theabsPath
node.Note that this method does not resolve any group membership, as this is the job of the user manager. nor does it augment the set with the "everyone" principal.
- Parameters:
absPath
- an absolute path.principals
- a set ofPrincipal
s for which is the privileges are retrieved.- Returns:
- an array of
Privilege
s. - Throws:
PathNotFoundException
- if no node atabsPath
exists or the session does not have sufficient access to retrieve a node at that location.AccessDeniedException
- if the session lacksREAD_ACCESS_CONTROL
privilege for theabsPath
node.RepositoryException
- if another error occurs.
-
getPrivilegeCollection
@NotNull default @NotNull PrivilegeCollection getPrivilegeCollection(@Nullable @Nullable String absPath) throws RepositoryException
Returns the
Note: For backwards compatibility this method comes with a default implementation that computes thePrivilegeCollection
for editing session at the given absolute path, which must be an existing node. This is equivalent toAccessControlManager.getPrivileges(String)
andAccessControlManager.hasPrivileges(String, Privilege[])
but allows for easy resolution of aggregated privileges (like e.g. jcr:all) and repeated evaluation if the editing session has privileges granted at the given target node.PrivilegeCollection
using regular JCR/Jackrabbit API, which might not be efficient. Implementations ofJackrabbitAccessControlManager
are therefore expected to overwrite the default.- Parameters:
absPath
- An absolute path to an existing JCR node.- Returns:
- A
PrivilegeCollection
wrapping around the privileges granted for the editing session at absPath. - Throws:
PathNotFoundException
- if no node atabsPath
exists or the session does not have sufficient access to retrieve a node at that location.RepositoryException
- If another error occurs.- Since:
- Oak 1.42.0
-
getPrivilegeCollection
@NotNull default @NotNull PrivilegeCollection getPrivilegeCollection(@Nullable @Nullable String absPath, @NotNull @NotNull Set<Principal> principals) throws RepositoryException
Returns the
Note: For backwards compatibility this method comes with a default implementation that computes thePrivilegeCollection
for the given set of principals at the given absolute path, which must be an existing node. This is equivalent togetPrivileges(String,Set)
andhasPrivileges(String, Set, Privilege[])
but allows for easy resolution of aggregated privileges (like e.g. jcr:all) and repeated evaluation if the editing session has privileges granted at the given target node.PrivilegeCollection
using regular JCR/Jackrabbit API, which might not be efficient. Implementations ofJackrabbitAccessControlManager
are therefore expected to overwrite the default.- Parameters:
absPath
- An absolute path to an existing JCR node.principals
- A set of principals for which thePrivilegeCollection
should be created.- Returns:
- A
PrivilegeCollection
wrapping around the privileges granted for the editing session at absPath. - Throws:
PathNotFoundException
- if no node atabsPath
exists or the session does not have sufficient access to retrieve a node at that location.AccessDeniedException
- if the session lacksREAD_ACCESS_CONTROL
privilege for theabsPath
node.RepositoryException
- If another error occurs.- Since:
- Oak 1.42.0
-
privilegeCollectionFromNames
@NotNull default @NotNull PrivilegeCollection privilegeCollectionFromNames(@NotNull @NotNull String... privilegeNames) throws RepositoryException
Returns the
Note: For backwards compatibility this method comes with a default implementation that computes thePrivilegeCollection
for the specifiedprivilegeNames
. Since the privilege names are JCR names, they may be passed in either qualified or expanded form (see specification for details on JCR names).PrivilegeCollection
using regular JCR/Jackrabbit API, which might not be efficient. Implementations ofJackrabbitAccessControlManager
are therefore expected to overwrite the default.- Parameters:
privilegeNames
- the names of existing privilege.- Returns:
- the
PrivilegeCollection
representing the specifiedprivilegeNames
. - Throws:
AccessControlException
- if no privilege with any of the specified names exists.RepositoryException
- If another error occurs.- Since:
- Oak 1.42.0
-
-