|  | @@ -21,7 +21,6 @@ import org.springframework.security.SpringSecurityMessageSource;
 | 
	
		
			
				|  |  |  import org.springframework.security.AfterInvocationManager;
 | 
	
		
			
				|  |  |  import org.springframework.security.Authentication;
 | 
	
		
			
				|  |  |  import org.springframework.security.AuthenticationCredentialsNotFoundException;
 | 
	
		
			
				|  |  | -import org.springframework.security.AuthenticationException;
 | 
	
		
			
				|  |  |  import org.springframework.security.AuthenticationManager;
 | 
	
		
			
				|  |  |  import org.springframework.security.ConfigAttribute;
 | 
	
		
			
				|  |  |  import org.springframework.security.ConfigAttributeDefinition;
 | 
	
	
		
			
				|  | @@ -56,438 +55,423 @@ import java.util.Set;
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  |  /**
 | 
	
		
			
				|  |  |   * Abstract class that implements security interception for secure objects.
 | 
	
		
			
				|  |  | - * <p>
 | 
	
		
			
				|  |  | - * The <code>AbstractSecurityInterceptor</code> will ensure the proper startup
 | 
	
		
			
				|  |  | - * configuration of the security interceptor. It will also implement the proper
 | 
	
		
			
				|  |  | - * handling of secure object invocations, being:
 | 
	
		
			
				|  |  | + * <p/>
 | 
	
		
			
				|  |  | + * The <code>AbstractSecurityInterceptor</code> will ensure the proper startup configuration of the security
 | 
	
		
			
				|  |  | + * interceptor. It will also implement the proper handling of secure object invocations, namely:
 | 
	
		
			
				|  |  |   * <ol>
 | 
	
		
			
				|  |  | - * <li>Obtain the {@link Authentication} object from the
 | 
	
		
			
				|  |  | - * {@link SecurityContextHolder}.</li>
 | 
	
		
			
				|  |  | - * <li>Determine if the request relates to a secured or public invocation by
 | 
	
		
			
				|  |  | - * looking up the secure object request against the
 | 
	
		
			
				|  |  | - * {@link ObjectDefinitionSource}.</li>
 | 
	
		
			
				|  |  | + * <li>Obtain the {@link Authentication} object from the {@link SecurityContextHolder}.</li>
 | 
	
		
			
				|  |  | + * <p/>
 | 
	
		
			
				|  |  | + * <li>Determine if the request relates to a secured or public invocation by ooking up the secure object request
 | 
	
		
			
				|  |  | + * against the {@link ObjectDefinitionSource}.</li>
 | 
	
		
			
				|  |  | + * <p/>
 | 
	
		
			
				|  |  |   * <li>For an invocation that is secured (there is a
 | 
	
		
			
				|  |  |   * <code>ConfigAttributeDefinition</code> for the secure object invocation):
 | 
	
		
			
				|  |  | + * <p/>
 | 
	
		
			
				|  |  |   * <ol type="a">
 | 
	
		
			
				|  |  | + * <p/>
 | 
	
		
			
				|  |  |   * <li>If either the {@link org.springframework.security.Authentication#isAuthenticated()}
 | 
	
		
			
				|  |  |   * returns <code>false</code>, or the {@link #alwaysReauthenticate} is
 | 
	
		
			
				|  |  | - * <code>true</code>, authenticate the request against the configured
 | 
	
		
			
				|  |  | - * {@link AuthenticationManager}. When authenticated, replace the
 | 
	
		
			
				|  |  | - * <code>Authentication</code> object on the
 | 
	
		
			
				|  |  | + * <code>true</code>, authenticate the request against the configured {@link AuthenticationManager}.
 | 
	
		
			
				|  |  | + * When authenticated, replace the <code>Authentication</code> object on the
 | 
	
		
			
				|  |  |   * <code>SecurityContextHolder</code> with the returned value.</li>
 | 
	
		
			
				|  |  | - * <li>Authorize the request against the configured
 | 
	
		
			
				|  |  | - * {@link AccessDecisionManager}.</li>
 | 
	
		
			
				|  |  | + * <p/>
 | 
	
		
			
				|  |  | + * <li>Authorize the request against the configured {@link AccessDecisionManager}.</li>
 | 
	
		
			
				|  |  | + * <p/>
 | 
	
		
			
				|  |  |   * <li>Perform any run-as replacement via the configured {@link RunAsManager}.</li>
 | 
	
		
			
				|  |  | - * <li>Pass control back to the concrete subclass, which will actually proceed
 | 
	
		
			
				|  |  | - * with executing the object. A {@link InterceptorStatusToken} is returned so
 | 
	
		
			
				|  |  | - * that after the subclass has finished proceeding with execution of the object,
 | 
	
		
			
				|  |  | - * its finally clause can ensure the <code>AbstractSecurityInterceptor</code>
 | 
	
		
			
				|  |  | + * <p/>
 | 
	
		
			
				|  |  | + * <li>Pass control back to the concrete subclass, which will actually proceed with executing the object.
 | 
	
		
			
				|  |  | + * A {@link InterceptorStatusToken} is returned so that after the subclass has finished proceeding with
 | 
	
		
			
				|  |  | + * execution of the object, its finally clause can ensure the <code>AbstractSecurityInterceptor</code>
 | 
	
		
			
				|  |  |   * is re-called and tidies up correctly.</li>
 | 
	
		
			
				|  |  | - * <li>The concrete subclass will re-call the
 | 
	
		
			
				|  |  | - * <code>AbstractSecurityInterceptor</code> via the
 | 
	
		
			
				|  |  | + * <p/>
 | 
	
		
			
				|  |  | + * <li>The concrete subclass will re-call the <code>AbstractSecurityInterceptor</code> via the
 | 
	
		
			
				|  |  |   * {@link #afterInvocation(InterceptorStatusToken, Object)} method.</li>
 | 
	
		
			
				|  |  | - * <li>If the <code>RunAsManager</code> replaced the
 | 
	
		
			
				|  |  | - * <code>Authentication</code> object, return the
 | 
	
		
			
				|  |  | - * <code>SecurityContextHolder</code> to the object that existed after the
 | 
	
		
			
				|  |  | - * call to <code>AuthenticationManager</code>.</li>
 | 
	
		
			
				|  |  | + * <p/>
 | 
	
		
			
				|  |  | + * <li>If the <code>RunAsManager</code> replaced the <code>Authentication</code> object, return the
 | 
	
		
			
				|  |  | + * <code>SecurityContextHolder</code> to the object that existed after the call to
 | 
	
		
			
				|  |  | + * <code>AuthenticationManager</code>.</li>
 | 
	
		
			
				|  |  | + * <p/>
 | 
	
		
			
				|  |  |   * <li>If an <code>AfterInvocationManager</code> is defined, invoke the
 | 
	
		
			
				|  |  |   * invocation manager and allow it to replace the object due to be returned to
 | 
	
		
			
				|  |  |   * the caller.</li>
 | 
	
		
			
				|  |  |   * </ol>
 | 
	
		
			
				|  |  | + * <p/>
 | 
	
		
			
				|  |  |   * </li>
 | 
	
		
			
				|  |  | - * <li>For an invocation that is public (there is no
 | 
	
		
			
				|  |  | - * <code>ConfigAttributeDefinition</code> for the secure object invocation):
 | 
	
		
			
				|  |  | + * <p/>
 | 
	
		
			
				|  |  | + * <li>For an invocation that is public (there is no <code>ConfigAttributeDefinition</code> for the secure object
 | 
	
		
			
				|  |  | + * invocation):
 | 
	
		
			
				|  |  |   * <ol type="a">
 | 
	
		
			
				|  |  | - * <li>As described above, the concrete subclass will be returned an
 | 
	
		
			
				|  |  | - * <code>InterceptorStatusToken</code> which is subsequently re-presented to
 | 
	
		
			
				|  |  | - * the <code>AbstractSecurityInterceptor</code> after the secure object has
 | 
	
		
			
				|  |  | - * been executed. The <code>AbstractSecurityInterceptor</code> will take no
 | 
	
		
			
				|  |  | - * further action when its {@link #afterInvocation(InterceptorStatusToken,
 | 
	
		
			
				|  |  | - * Object)} is called.</li>
 | 
	
		
			
				|  |  | + * <p/>
 | 
	
		
			
				|  |  | + * <li>As described above, the concrete subclass will be returned an <code>InterceptorStatusToken</code> which is
 | 
	
		
			
				|  |  | + * subsequently re-presented to the <code>AbstractSecurityInterceptor</code> after the secure object has been executed.
 | 
	
		
			
				|  |  | + * The <code>AbstractSecurityInterceptor</code> will take no further action when its
 | 
	
		
			
				|  |  | + * {@link #afterInvocation(InterceptorStatusToken, Object)} is called.</li>
 | 
	
		
			
				|  |  |   * </ol>
 | 
	
		
			
				|  |  |   * </li>
 | 
	
		
			
				|  |  | - * <li>Control again returns to the concrete subclass, along with the
 | 
	
		
			
				|  |  | - * <code>Object</code> that should be returned to the caller. The subclass
 | 
	
		
			
				|  |  | - * will then return that result or exception to the original caller.</li>
 | 
	
		
			
				|  |  | + * <p/>
 | 
	
		
			
				|  |  | + * <li>Control again returns to the concrete subclass, along with the <code>Object</code> that should be returned to
 | 
	
		
			
				|  |  | + * the caller. The subclass will then return that result or exception to the original caller.</li>
 | 
	
		
			
				|  |  |   * </ol>
 | 
	
		
			
				|  |  | - * </p>
 | 
	
		
			
				|  |  |   *
 | 
	
		
			
				|  |  |   * @author Ben Alex
 | 
	
		
			
				|  |  | - * @version $Id: AbstractSecurityInterceptor.java 1790 2007-03-30 18:27:19Z
 | 
	
		
			
				|  |  | - * luke_t $
 | 
	
		
			
				|  |  | + * @version $Id$
 | 
	
		
			
				|  |  |   */
 | 
	
		
			
				|  |  |  public abstract class AbstractSecurityInterceptor implements InitializingBean, ApplicationEventPublisherAware,
 | 
	
		
			
				|  |  | -		MessageSourceAware {
 | 
	
		
			
				|  |  | -	// ~ Static fields/initializers
 | 
	
		
			
				|  |  | -	// =====================================================================================
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -	protected static final Log logger = LogFactory.getLog(AbstractSecurityInterceptor.class);
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -	// ~ Instance fields
 | 
	
		
			
				|  |  | -	// ================================================================================================
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -	private AccessDecisionManager accessDecisionManager;
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -	private AfterInvocationManager afterInvocationManager;
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -	private ApplicationEventPublisher eventPublisher;
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -	private AuthenticationManager authenticationManager;
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -	protected MessageSourceAccessor messages = SpringSecurityMessageSource.getAccessor();
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -	private RunAsManager runAsManager = new NullRunAsManager();
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -	private boolean alwaysReauthenticate = false;
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -	private boolean rejectPublicInvocations = false;
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -	private boolean validateConfigAttributes = true;
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -	// ~ Methods
 | 
	
		
			
				|  |  | -	// ========================================================================================================
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -	/**
 | 
	
		
			
				|  |  | -	 * Completes the work of the <code>AbstractSecurityInterceptor</code>
 | 
	
		
			
				|  |  | -	 * after the secure object invocation has been complete
 | 
	
		
			
				|  |  | -	 *
 | 
	
		
			
				|  |  | -	 * @param token as returned by the {@link #beforeInvocation(Object)}}
 | 
	
		
			
				|  |  | -	 * method
 | 
	
		
			
				|  |  | -	 * @param returnedObject any object returned from the secure object
 | 
	
		
			
				|  |  | -	 * invocation (may be<code>null</code>)
 | 
	
		
			
				|  |  | -	 *
 | 
	
		
			
				|  |  | -	 * @return the object the secure object invocation should ultimately return
 | 
	
		
			
				|  |  | -	 * to its caller (may be <code>null</code>)
 | 
	
		
			
				|  |  | -	 */
 | 
	
		
			
				|  |  | -	protected Object afterInvocation(InterceptorStatusToken token, Object returnedObject) {
 | 
	
		
			
				|  |  | -		if (token == null) {
 | 
	
		
			
				|  |  | -			// public object
 | 
	
		
			
				|  |  | -			return returnedObject;
 | 
	
		
			
				|  |  | -		}
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -		if (token.isContextHolderRefreshRequired()) {
 | 
	
		
			
				|  |  | -			if (logger.isDebugEnabled()) {
 | 
	
		
			
				|  |  | -				logger.debug("Reverting to original Authentication: " + token.getAuthentication().toString());
 | 
	
		
			
				|  |  | -			}
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -			SecurityContextHolder.getContext().setAuthentication(token.getAuthentication());
 | 
	
		
			
				|  |  | -		}
 | 
	
		
			
				|  |  | +        MessageSourceAware {
 | 
	
		
			
				|  |  | +    //~ Static fields/initializers =====================================================================================
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -		if (afterInvocationManager != null) {
 | 
	
		
			
				|  |  | -			// Attempt after invocation handling
 | 
	
		
			
				|  |  | -			try {
 | 
	
		
			
				|  |  | -				returnedObject = afterInvocationManager.decide(token.getAuthentication(), token.getSecureObject(),
 | 
	
		
			
				|  |  | -						token.getAttr(), returnedObject);
 | 
	
		
			
				|  |  | -			}
 | 
	
		
			
				|  |  | -			catch (AccessDeniedException accessDeniedException) {
 | 
	
		
			
				|  |  | -				AuthorizationFailureEvent event = new AuthorizationFailureEvent(token.getSecureObject(), token
 | 
	
		
			
				|  |  | -						.getAttr(), token.getAuthentication(), accessDeniedException);
 | 
	
		
			
				|  |  | -				publishEvent(event);
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -				throw accessDeniedException;
 | 
	
		
			
				|  |  | -			}
 | 
	
		
			
				|  |  | -		}
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -		return returnedObject;
 | 
	
		
			
				|  |  | -	}
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -	public void afterPropertiesSet() throws Exception {
 | 
	
		
			
				|  |  | -		Assert.notNull(getSecureObjectClass(), "Subclass must provide a non-null response to getSecureObjectClass()");
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -		Assert.notNull(this.messages, "A message source must be set");
 | 
	
		
			
				|  |  | +    protected static final Log logger = LogFactory.getLog(AbstractSecurityInterceptor.class);
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -		Assert.notNull(this.authenticationManager, "An AuthenticationManager is required");
 | 
	
		
			
				|  |  | +    //~ Instance fields ================================================================================================
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -		Assert.notNull(this.accessDecisionManager, "An AccessDecisionManager is required");
 | 
	
		
			
				|  |  | +    private AccessDecisionManager accessDecisionManager;
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -		Assert.notNull(this.runAsManager, "A RunAsManager is required");
 | 
	
		
			
				|  |  | +    private AfterInvocationManager afterInvocationManager;
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -		Assert.notNull(this.obtainObjectDefinitionSource(), "An ObjectDefinitionSource is required");
 | 
	
		
			
				|  |  | +    private ApplicationEventPublisher eventPublisher;
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -		Assert.isTrue(this.obtainObjectDefinitionSource().supports(getSecureObjectClass()),
 | 
	
		
			
				|  |  | -				"ObjectDefinitionSource does not support secure object class: " + getSecureObjectClass());
 | 
	
		
			
				|  |  | +    private AuthenticationManager authenticationManager;
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -		Assert.isTrue(this.runAsManager.supports(getSecureObjectClass()),
 | 
	
		
			
				|  |  | -				"RunAsManager does not support secure object class: " + getSecureObjectClass());
 | 
	
		
			
				|  |  | +    protected MessageSourceAccessor messages = SpringSecurityMessageSource.getAccessor();
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -		Assert.isTrue(this.accessDecisionManager.supports(getSecureObjectClass()),
 | 
	
		
			
				|  |  | -				"AccessDecisionManager does not support secure object class: " + getSecureObjectClass());
 | 
	
		
			
				|  |  | +    private RunAsManager runAsManager = new NullRunAsManager();
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -		if (this.afterInvocationManager != null) {
 | 
	
		
			
				|  |  | -			Assert.isTrue(this.afterInvocationManager.supports(getSecureObjectClass()),
 | 
	
		
			
				|  |  | -					"AfterInvocationManager does not support secure object class: " + getSecureObjectClass());
 | 
	
		
			
				|  |  | -		}
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -		if (this.validateConfigAttributes) {
 | 
	
		
			
				|  |  | -			Iterator iter = this.obtainObjectDefinitionSource().getConfigAttributeDefinitions();
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -			if (iter == null) {
 | 
	
		
			
				|  |  | -				logger.warn("Could not validate configuration attributes as the MethodDefinitionSource did not return "
 | 
	
		
			
				|  |  | -						+ "a ConfigAttributeDefinition Iterator");
 | 
	
		
			
				|  |  | -				return;
 | 
	
		
			
				|  |  | -			}
 | 
	
		
			
				|  |  | +    private boolean alwaysReauthenticate = false;
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -			Set unsupportedAttrs = new HashSet();
 | 
	
		
			
				|  |  | +    private boolean rejectPublicInvocations = false;
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -			while (iter.hasNext()) {
 | 
	
		
			
				|  |  | -				ConfigAttributeDefinition def = (ConfigAttributeDefinition) iter.next();
 | 
	
		
			
				|  |  | -				Iterator attributes = def.getConfigAttributes();
 | 
	
		
			
				|  |  | +    private boolean validateConfigAttributes = true;
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -				while (attributes.hasNext()) {
 | 
	
		
			
				|  |  | -					ConfigAttribute attr = (ConfigAttribute) attributes.next();
 | 
	
		
			
				|  |  | +    //~ Methods ========================================================================================================
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -					if (!this.runAsManager.supports(attr) && !this.accessDecisionManager.supports(attr)
 | 
	
		
			
				|  |  | -							&& ((this.afterInvocationManager == null) || !this.afterInvocationManager.supports(attr))) {
 | 
	
		
			
				|  |  | -						unsupportedAttrs.add(attr);
 | 
	
		
			
				|  |  | -					}
 | 
	
		
			
				|  |  | -				}
 | 
	
		
			
				|  |  | -			}
 | 
	
		
			
				|  |  | +    /**
 | 
	
		
			
				|  |  | +     * Completes the work of the <code>AbstractSecurityInterceptor</code>
 | 
	
		
			
				|  |  | +     * after the secure object invocation has been complete
 | 
	
		
			
				|  |  | +     *
 | 
	
		
			
				|  |  | +     * @param token as returned by the {@link #beforeInvocation(Object)}} method
 | 
	
		
			
				|  |  | +     * @param returnedObject any object returned from the secure object invocation (may be<code>null</code>)
 | 
	
		
			
				|  |  | +     * @return the object the secure object invocation should ultimately return to its caller (may be <code>null</code>)
 | 
	
		
			
				|  |  | +     */
 | 
	
		
			
				|  |  | +    protected Object afterInvocation(InterceptorStatusToken token, Object returnedObject) {
 | 
	
		
			
				|  |  | +        if (token == null) {
 | 
	
		
			
				|  |  | +            // public object
 | 
	
		
			
				|  |  | +            return returnedObject;
 | 
	
		
			
				|  |  | +        }
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -			if (unsupportedAttrs.size() != 0) {
 | 
	
		
			
				|  |  | -				throw new IllegalArgumentException("Unsupported configuration attributes: " + unsupportedAttrs);
 | 
	
		
			
				|  |  | -			}
 | 
	
		
			
				|  |  | +        if (token.isContextHolderRefreshRequired()) {
 | 
	
		
			
				|  |  | +            if (logger.isDebugEnabled()) {
 | 
	
		
			
				|  |  | +                logger.debug("Reverting to original Authentication: " + token.getAuthentication().toString());
 | 
	
		
			
				|  |  | +            }
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -			logger.info("Validated configuration attributes");
 | 
	
		
			
				|  |  | -		}
 | 
	
		
			
				|  |  | -	}
 | 
	
		
			
				|  |  | +            SecurityContextHolder.getContext().setAuthentication(token.getAuthentication());
 | 
	
		
			
				|  |  | +        }
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -	protected InterceptorStatusToken beforeInvocation(Object object) {
 | 
	
		
			
				|  |  | -		Assert.notNull(object, "Object was null");
 | 
	
		
			
				|  |  | +        if (afterInvocationManager != null) {
 | 
	
		
			
				|  |  | +            // Attempt after invocation handling
 | 
	
		
			
				|  |  | +            try {
 | 
	
		
			
				|  |  | +                returnedObject = afterInvocationManager.decide(token.getAuthentication(), token.getSecureObject(),
 | 
	
		
			
				|  |  | +                        token.getAttr(), returnedObject);
 | 
	
		
			
				|  |  | +            }
 | 
	
		
			
				|  |  | +            catch (AccessDeniedException accessDeniedException) {
 | 
	
		
			
				|  |  | +                AuthorizationFailureEvent event = new AuthorizationFailureEvent(token.getSecureObject(), token
 | 
	
		
			
				|  |  | +                        .getAttr(), token.getAuthentication(), accessDeniedException);
 | 
	
		
			
				|  |  | +                publishEvent(event);
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -		if (!getSecureObjectClass().isAssignableFrom(object.getClass())) {
 | 
	
		
			
				|  |  | -			throw new IllegalArgumentException("Security invocation attempted for object "
 | 
	
		
			
				|  |  | -					+ object.getClass().getName()
 | 
	
		
			
				|  |  | -					+ " but AbstractSecurityInterceptor only configured to support secure objects of type: "
 | 
	
		
			
				|  |  | -					+ getSecureObjectClass());
 | 
	
		
			
				|  |  | -		}
 | 
	
		
			
				|  |  | +                throw accessDeniedException;
 | 
	
		
			
				|  |  | +            }
 | 
	
		
			
				|  |  | +        }
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -		ConfigAttributeDefinition attr = this.obtainObjectDefinitionSource().getAttributes(object);
 | 
	
		
			
				|  |  | +        return returnedObject;
 | 
	
		
			
				|  |  | +    }
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -		if (attr == null) {
 | 
	
		
			
				|  |  | -			if (rejectPublicInvocations) {
 | 
	
		
			
				|  |  | -				throw new IllegalArgumentException(
 | 
	
		
			
				|  |  | -						"No public invocations are allowed via this AbstractSecurityInterceptor. "
 | 
	
		
			
				|  |  | -								+ "This indicates a configuration error because the "
 | 
	
		
			
				|  |  | -								+ "AbstractSecurityInterceptor.rejectPublicInvocations property is set to 'true'");
 | 
	
		
			
				|  |  | -			}
 | 
	
		
			
				|  |  | +    public void afterPropertiesSet() throws Exception {
 | 
	
		
			
				|  |  | +        Assert.notNull(getSecureObjectClass(), "Subclass must provide a non-null response to getSecureObjectClass()");
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -			if (logger.isDebugEnabled()) {
 | 
	
		
			
				|  |  | -				logger.debug("Public object - authentication not attempted");
 | 
	
		
			
				|  |  | -			}
 | 
	
		
			
				|  |  | +        Assert.notNull(this.messages, "A message source must be set");
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -			publishEvent(new PublicInvocationEvent(object));
 | 
	
		
			
				|  |  | +        Assert.notNull(this.authenticationManager, "An AuthenticationManager is required");
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -			return null; // no further work post-invocation
 | 
	
		
			
				|  |  | -		}
 | 
	
		
			
				|  |  | +        Assert.notNull(this.accessDecisionManager, "An AccessDecisionManager is required");
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -		if (logger.isDebugEnabled()) {
 | 
	
		
			
				|  |  | -			logger.debug("Secure object: " + object.toString() + "; ConfigAttributes: " + attr.toString());
 | 
	
		
			
				|  |  | -		}
 | 
	
		
			
				|  |  | +        Assert.notNull(this.runAsManager, "A RunAsManager is required");
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -		if (SecurityContextHolder.getContext().getAuthentication() == null) {
 | 
	
		
			
				|  |  | -			credentialsNotFound(messages.getMessage("AbstractSecurityInterceptor.authenticationNotFound",
 | 
	
		
			
				|  |  | -					"An Authentication object was not found in the SecurityContext"), object, attr);
 | 
	
		
			
				|  |  | -		}
 | 
	
		
			
				|  |  | +        Assert.notNull(this.obtainObjectDefinitionSource(), "An ObjectDefinitionSource is required");
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -		// Attempt authentication if not already authenticated, or user always
 | 
	
		
			
				|  |  | -		// wants reauthentication
 | 
	
		
			
				|  |  | -		Authentication authenticated;
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -		if (!SecurityContextHolder.getContext().getAuthentication().isAuthenticated() || alwaysReauthenticate) {
 | 
	
		
			
				|  |  | -			try {
 | 
	
		
			
				|  |  | -				authenticated = this.authenticationManager.authenticate(SecurityContextHolder.getContext()
 | 
	
		
			
				|  |  | -						.getAuthentication());
 | 
	
		
			
				|  |  | -			}
 | 
	
		
			
				|  |  | -			catch (AuthenticationException authenticationException) {
 | 
	
		
			
				|  |  | -				throw authenticationException;
 | 
	
		
			
				|  |  | -			}
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -			// We don't authenticated.setAuthentication(true), because each
 | 
	
		
			
				|  |  | -			// provider should do that
 | 
	
		
			
				|  |  | -			if (logger.isDebugEnabled()) {
 | 
	
		
			
				|  |  | -				logger.debug("Successfully Authenticated: " + authenticated.toString());
 | 
	
		
			
				|  |  | -			}
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -			SecurityContextHolder.getContext().setAuthentication(authenticated);
 | 
	
		
			
				|  |  | -		}
 | 
	
		
			
				|  |  | -		else {
 | 
	
		
			
				|  |  | -			authenticated = SecurityContextHolder.getContext().getAuthentication();
 | 
	
		
			
				|  |  | +        Assert.isTrue(this.obtainObjectDefinitionSource().supports(getSecureObjectClass()),
 | 
	
		
			
				|  |  | +                "ObjectDefinitionSource does not support secure object class: " + getSecureObjectClass());
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -			if (logger.isDebugEnabled()) {
 | 
	
		
			
				|  |  | -				logger.debug("Previously Authenticated: " + authenticated.toString());
 | 
	
		
			
				|  |  | -			}
 | 
	
		
			
				|  |  | -		}
 | 
	
		
			
				|  |  | +        Assert.isTrue(this.runAsManager.supports(getSecureObjectClass()),
 | 
	
		
			
				|  |  | +                "RunAsManager does not support secure object class: " + getSecureObjectClass());
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -		// Attempt authorization
 | 
	
		
			
				|  |  | -		try {
 | 
	
		
			
				|  |  | -			this.accessDecisionManager.decide(authenticated, object, attr);
 | 
	
		
			
				|  |  | -		}
 | 
	
		
			
				|  |  | -		catch (AccessDeniedException accessDeniedException) {
 | 
	
		
			
				|  |  | -			AuthorizationFailureEvent event = new AuthorizationFailureEvent(object, attr, authenticated,
 | 
	
		
			
				|  |  | -					accessDeniedException);
 | 
	
		
			
				|  |  | -			publishEvent(event);
 | 
	
		
			
				|  |  | +        Assert.isTrue(this.accessDecisionManager.supports(getSecureObjectClass()),
 | 
	
		
			
				|  |  | +                "AccessDecisionManager does not support secure object class: " + getSecureObjectClass());
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -			throw accessDeniedException;
 | 
	
		
			
				|  |  | -		}
 | 
	
		
			
				|  |  | +        if (this.afterInvocationManager != null) {
 | 
	
		
			
				|  |  | +            Assert.isTrue(this.afterInvocationManager.supports(getSecureObjectClass()),
 | 
	
		
			
				|  |  | +                    "AfterInvocationManager does not support secure object class: " + getSecureObjectClass());
 | 
	
		
			
				|  |  | +        }
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -		if (logger.isDebugEnabled()) {
 | 
	
		
			
				|  |  | -			logger.debug("Authorization successful");
 | 
	
		
			
				|  |  | -		}
 | 
	
		
			
				|  |  | +        if (this.validateConfigAttributes) {
 | 
	
		
			
				|  |  | +            Iterator iter = this.obtainObjectDefinitionSource().getConfigAttributeDefinitions();
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -		AuthorizedEvent event = new AuthorizedEvent(object, attr, authenticated);
 | 
	
		
			
				|  |  | -		publishEvent(event);
 | 
	
		
			
				|  |  | +            if (iter == null) {
 | 
	
		
			
				|  |  | +                logger.warn("Could not validate configuration attributes as the MethodDefinitionSource did not return "
 | 
	
		
			
				|  |  | +                        + "a ConfigAttributeDefinition Iterator");
 | 
	
		
			
				|  |  | +                return;
 | 
	
		
			
				|  |  | +            }
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -		// Attempt to run as a different user
 | 
	
		
			
				|  |  | -		Authentication runAs = this.runAsManager.buildRunAs(authenticated, object, attr);
 | 
	
		
			
				|  |  | +            Set unsupportedAttrs = new HashSet();
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -		if (runAs == null) {
 | 
	
		
			
				|  |  | -			if (logger.isDebugEnabled()) {
 | 
	
		
			
				|  |  | -				logger.debug("RunAsManager did not change Authentication object");
 | 
	
		
			
				|  |  | -			}
 | 
	
		
			
				|  |  | +            while (iter.hasNext()) {
 | 
	
		
			
				|  |  | +                ConfigAttributeDefinition def = (ConfigAttributeDefinition) iter.next();
 | 
	
		
			
				|  |  | +                Iterator attributes = def.getConfigAttributes();
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -			// no further work post-invocation
 | 
	
		
			
				|  |  | -			return new InterceptorStatusToken(authenticated, false, attr, object);
 | 
	
		
			
				|  |  | -		}
 | 
	
		
			
				|  |  | -		else {
 | 
	
		
			
				|  |  | -			if (logger.isDebugEnabled()) {
 | 
	
		
			
				|  |  | -				logger.debug("Switching to RunAs Authentication: " + runAs.toString());
 | 
	
		
			
				|  |  | -			}
 | 
	
		
			
				|  |  | +                while (attributes.hasNext()) {
 | 
	
		
			
				|  |  | +                    ConfigAttribute attr = (ConfigAttribute) attributes.next();
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -			SecurityContextHolder.getContext().setAuthentication(runAs);
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -			// revert to token.Authenticated post-invocation
 | 
	
		
			
				|  |  | -			return new InterceptorStatusToken(authenticated, true, attr, object);
 | 
	
		
			
				|  |  | -		}
 | 
	
		
			
				|  |  | -	}
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -	/**
 | 
	
		
			
				|  |  | -	 * Helper method which generates an exception containing the passed reason,
 | 
	
		
			
				|  |  | -	 * and publishes an event to the application context.
 | 
	
		
			
				|  |  | -	 * <p>
 | 
	
		
			
				|  |  | -	 * Always throws an exception.
 | 
	
		
			
				|  |  | -	 * </p>
 | 
	
		
			
				|  |  | -	 *
 | 
	
		
			
				|  |  | -	 * @param reason to be provided in the exception detail
 | 
	
		
			
				|  |  | -	 * @param secureObject that was being called
 | 
	
		
			
				|  |  | -	 * @param configAttribs that were defined for the secureObject
 | 
	
		
			
				|  |  | -	 */
 | 
	
		
			
				|  |  | -	private void credentialsNotFound(String reason, Object secureObject, ConfigAttributeDefinition configAttribs) {
 | 
	
		
			
				|  |  | -		AuthenticationCredentialsNotFoundException exception = new AuthenticationCredentialsNotFoundException(reason);
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -		AuthenticationCredentialsNotFoundEvent event = new AuthenticationCredentialsNotFoundEvent(secureObject,
 | 
	
		
			
				|  |  | -				configAttribs, exception);
 | 
	
		
			
				|  |  | -		publishEvent(event);
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -		throw exception;
 | 
	
		
			
				|  |  | -	}
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -	public AccessDecisionManager getAccessDecisionManager() {
 | 
	
		
			
				|  |  | -		return accessDecisionManager;
 | 
	
		
			
				|  |  | -	}
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -	public AfterInvocationManager getAfterInvocationManager() {
 | 
	
		
			
				|  |  | -		return afterInvocationManager;
 | 
	
		
			
				|  |  | -	}
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -	public AuthenticationManager getAuthenticationManager() {
 | 
	
		
			
				|  |  | -		return this.authenticationManager;
 | 
	
		
			
				|  |  | -	}
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -	public RunAsManager getRunAsManager() {
 | 
	
		
			
				|  |  | -		return runAsManager;
 | 
	
		
			
				|  |  | -	}
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -	/**
 | 
	
		
			
				|  |  | -	 * Indicates the type of secure objects the subclass will be presenting to
 | 
	
		
			
				|  |  | -	 * the abstract parent for processing. This is used to ensure collaborators
 | 
	
		
			
				|  |  | -	 * wired to the <code>AbstractSecurityInterceptor</code> all support the
 | 
	
		
			
				|  |  | -	 * indicated secure object class.
 | 
	
		
			
				|  |  | +                    if (!this.runAsManager.supports(attr) && !this.accessDecisionManager.supports(attr)
 | 
	
		
			
				|  |  | +                            && ((this.afterInvocationManager == null) || !this.afterInvocationManager.supports(attr))) {
 | 
	
		
			
				|  |  | +                        unsupportedAttrs.add(attr);
 | 
	
		
			
				|  |  | +                    }
 | 
	
		
			
				|  |  | +                }
 | 
	
		
			
				|  |  | +            }
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +            if (unsupportedAttrs.size() != 0) {
 | 
	
		
			
				|  |  | +                throw new IllegalArgumentException("Unsupported configuration attributes: " + unsupportedAttrs);
 | 
	
		
			
				|  |  | +            }
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +            logger.info("Validated configuration attributes");
 | 
	
		
			
				|  |  | +        }
 | 
	
		
			
				|  |  | +    }
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +    protected InterceptorStatusToken beforeInvocation(Object object) {
 | 
	
		
			
				|  |  | +        Assert.notNull(object, "Object was null");
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +        if (!getSecureObjectClass().isAssignableFrom(object.getClass())) {
 | 
	
		
			
				|  |  | +            throw new IllegalArgumentException("Security invocation attempted for object "
 | 
	
		
			
				|  |  | +                    + object.getClass().getName()
 | 
	
		
			
				|  |  | +                    + " but AbstractSecurityInterceptor only configured to support secure objects of type: "
 | 
	
		
			
				|  |  | +                    + getSecureObjectClass());
 | 
	
		
			
				|  |  | +        }
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +        ConfigAttributeDefinition attr = this.obtainObjectDefinitionSource().getAttributes(object);
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +        if (attr == null) {
 | 
	
		
			
				|  |  | +            if (rejectPublicInvocations) {
 | 
	
		
			
				|  |  | +                throw new IllegalArgumentException(
 | 
	
		
			
				|  |  | +                        "No public invocations are allowed via this AbstractSecurityInterceptor. "
 | 
	
		
			
				|  |  | +                                + "This indicates a configuration error because the "
 | 
	
		
			
				|  |  | +                                + "AbstractSecurityInterceptor.rejectPublicInvocations property is set to 'true'");
 | 
	
		
			
				|  |  | +            }
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +            if (logger.isDebugEnabled()) {
 | 
	
		
			
				|  |  | +                logger.debug("Public object - authentication not attempted");
 | 
	
		
			
				|  |  | +            }
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +            publishEvent(new PublicInvocationEvent(object));
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +            return null; // no further work post-invocation
 | 
	
		
			
				|  |  | +        }
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +        if (logger.isDebugEnabled()) {
 | 
	
		
			
				|  |  | +            logger.debug("Secure object: " + object.toString() + "; ConfigAttributes: " + attr.toString());
 | 
	
		
			
				|  |  | +        }
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +        if (SecurityContextHolder.getContext().getAuthentication() == null) {
 | 
	
		
			
				|  |  | +            credentialsNotFound(messages.getMessage("AbstractSecurityInterceptor.authenticationNotFound",
 | 
	
		
			
				|  |  | +                    "An Authentication object was not found in the SecurityContext"), object, attr);
 | 
	
		
			
				|  |  | +        }
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +        // Attempt authentication if not already authenticated, or user always
 | 
	
		
			
				|  |  | +        // wants reauthentication
 | 
	
		
			
				|  |  | +        Authentication authenticated;
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +        if (!SecurityContextHolder.getContext().getAuthentication().isAuthenticated() || alwaysReauthenticate) {
 | 
	
		
			
				|  |  | +            authenticated =
 | 
	
		
			
				|  |  | +                    this.authenticationManager.authenticate(SecurityContextHolder.getContext().getAuthentication());
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +            // We don't authenticated.setAuthentication(true), because each
 | 
	
		
			
				|  |  | +            // provider should do that
 | 
	
		
			
				|  |  | +            if (logger.isDebugEnabled()) {
 | 
	
		
			
				|  |  | +                logger.debug("Successfully Authenticated: " + authenticated.toString());
 | 
	
		
			
				|  |  | +            }
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +            SecurityContextHolder.getContext().setAuthentication(authenticated);
 | 
	
		
			
				|  |  | +        } else {
 | 
	
		
			
				|  |  | +            authenticated = SecurityContextHolder.getContext().getAuthentication();
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +            if (logger.isDebugEnabled()) {
 | 
	
		
			
				|  |  | +                logger.debug("Previously Authenticated: " + authenticated.toString());
 | 
	
		
			
				|  |  | +            }
 | 
	
		
			
				|  |  | +        }
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +        // Attempt authorization
 | 
	
		
			
				|  |  | +        try {
 | 
	
		
			
				|  |  | +            this.accessDecisionManager.decide(authenticated, object, attr);
 | 
	
		
			
				|  |  | +        }
 | 
	
		
			
				|  |  | +        catch (AccessDeniedException accessDeniedException) {
 | 
	
		
			
				|  |  | +            AuthorizationFailureEvent event = new AuthorizationFailureEvent(object, attr, authenticated,
 | 
	
		
			
				|  |  | +                    accessDeniedException);
 | 
	
		
			
				|  |  | +            publishEvent(event);
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +            throw accessDeniedException;
 | 
	
		
			
				|  |  | +        }
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +        if (logger.isDebugEnabled()) {
 | 
	
		
			
				|  |  | +            logger.debug("Authorization successful");
 | 
	
		
			
				|  |  | +        }
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +        AuthorizedEvent event = new AuthorizedEvent(object, attr, authenticated);
 | 
	
		
			
				|  |  | +        publishEvent(event);
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +        // Attempt to run as a different user
 | 
	
		
			
				|  |  | +        Authentication runAs = this.runAsManager.buildRunAs(authenticated, object, attr);
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +        if (runAs == null) {
 | 
	
		
			
				|  |  | +            if (logger.isDebugEnabled()) {
 | 
	
		
			
				|  |  | +                logger.debug("RunAsManager did not change Authentication object");
 | 
	
		
			
				|  |  | +            }
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +            // no further work post-invocation
 | 
	
		
			
				|  |  | +            return new InterceptorStatusToken(authenticated, false, attr, object);
 | 
	
		
			
				|  |  | +        } else {
 | 
	
		
			
				|  |  | +            if (logger.isDebugEnabled()) {
 | 
	
		
			
				|  |  | +                logger.debug("Switching to RunAs Authentication: " + runAs.toString());
 | 
	
		
			
				|  |  | +            }
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +            SecurityContextHolder.getContext().setAuthentication(runAs);
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +            // revert to token.Authenticated post-invocation
 | 
	
		
			
				|  |  | +            return new InterceptorStatusToken(authenticated, true, attr, object);
 | 
	
		
			
				|  |  | +        }
 | 
	
		
			
				|  |  | +    }
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +    /**
 | 
	
		
			
				|  |  | +     * Helper method which generates an exception containing the passed reason,
 | 
	
		
			
				|  |  | +     * and publishes an event to the application context.
 | 
	
		
			
				|  |  | +     * <p/>
 | 
	
		
			
				|  |  | +     * Always throws an exception.
 | 
	
		
			
				|  |  | +     *
 | 
	
		
			
				|  |  | +     * @param reason        to be provided in the exception detail
 | 
	
		
			
				|  |  | +     * @param secureObject  that was being called
 | 
	
		
			
				|  |  | +     * @param configAttribs that were defined for the secureObject
 | 
	
		
			
				|  |  | +     */
 | 
	
		
			
				|  |  | +    private void credentialsNotFound(String reason, Object secureObject, ConfigAttributeDefinition configAttribs) {
 | 
	
		
			
				|  |  | +        AuthenticationCredentialsNotFoundException exception = new AuthenticationCredentialsNotFoundException(reason);
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +        AuthenticationCredentialsNotFoundEvent event = new AuthenticationCredentialsNotFoundEvent(secureObject,
 | 
	
		
			
				|  |  | +                configAttribs, exception);
 | 
	
		
			
				|  |  | +        publishEvent(event);
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +        throw exception;
 | 
	
		
			
				|  |  | +    }
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +    public AccessDecisionManager getAccessDecisionManager() {
 | 
	
		
			
				|  |  | +        return accessDecisionManager;
 | 
	
		
			
				|  |  | +    }
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +    public AfterInvocationManager getAfterInvocationManager() {
 | 
	
		
			
				|  |  | +        return afterInvocationManager;
 | 
	
		
			
				|  |  | +    }
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +    public AuthenticationManager getAuthenticationManager() {
 | 
	
		
			
				|  |  | +        return this.authenticationManager;
 | 
	
		
			
				|  |  | +    }
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +    public RunAsManager getRunAsManager() {
 | 
	
		
			
				|  |  | +        return runAsManager;
 | 
	
		
			
				|  |  | +    }
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +    /**
 | 
	
		
			
				|  |  | +     * Indicates the type of secure objects the subclass will be presenting to
 | 
	
		
			
				|  |  | +     * the abstract parent for processing. This is used to ensure collaborators
 | 
	
		
			
				|  |  | +     * wired to the <code>AbstractSecurityInterceptor</code> all support the
 | 
	
		
			
				|  |  | +     * indicated secure object class.
 | 
	
		
			
				|  |  | +     *
 | 
	
		
			
				|  |  | +     * @return the type of secure object the subclass provides services for
 | 
	
		
			
				|  |  | +     */
 | 
	
		
			
				|  |  | +    public abstract Class getSecureObjectClass();
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +    public boolean isAlwaysReauthenticate() {
 | 
	
		
			
				|  |  | +        return alwaysReauthenticate;
 | 
	
		
			
				|  |  | +    }
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +    public boolean isRejectPublicInvocations() {
 | 
	
		
			
				|  |  | +        return rejectPublicInvocations;
 | 
	
		
			
				|  |  | +    }
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +    public boolean isValidateConfigAttributes() {
 | 
	
		
			
				|  |  | +        return validateConfigAttributes;
 | 
	
		
			
				|  |  | +    }
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +    public abstract ObjectDefinitionSource obtainObjectDefinitionSource();
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +    public void setAccessDecisionManager(AccessDecisionManager accessDecisionManager) {
 | 
	
		
			
				|  |  | +        this.accessDecisionManager = accessDecisionManager;
 | 
	
		
			
				|  |  | +    }
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +    public void setAfterInvocationManager(AfterInvocationManager afterInvocationManager) {
 | 
	
		
			
				|  |  | +        this.afterInvocationManager = afterInvocationManager;
 | 
	
		
			
				|  |  | +    }
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +    /**
 | 
	
		
			
				|  |  | +     * Indicates whether the <code>AbstractSecurityInterceptor</code> should
 | 
	
		
			
				|  |  | +     * ignore the {@link Authentication#isAuthenticated()} property. Defaults to
 | 
	
		
			
				|  |  | +     * <code>false</code>, meaning by default the
 | 
	
		
			
				|  |  | +     * <code>Authentication.isAuthenticated()</code> property is trusted and
 | 
	
		
			
				|  |  | +     * re-authentication will not occur if the principal has already been
 | 
	
		
			
				|  |  | +     * authenticated.
 | 
	
		
			
				|  |  | +     *
 | 
	
		
			
				|  |  | +     * @param alwaysReauthenticate <code>true</code> to force <code>AbstractSecurityInterceptor</code> to
 | 
	
		
			
				|  |  | +     * disregard the value of <code>Authentication.isAuthenticated()</code> and always re-authenticate the request
 | 
	
		
			
				|  |  | +     * (defaults to <code>false</code>).
 | 
	
		
			
				|  |  | +     */
 | 
	
		
			
				|  |  | +    public void setAlwaysReauthenticate(boolean alwaysReauthenticate) {
 | 
	
		
			
				|  |  | +        this.alwaysReauthenticate = alwaysReauthenticate;
 | 
	
		
			
				|  |  | +    }
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +    public void setApplicationEventPublisher(ApplicationEventPublisher applicationEventPublisher) {
 | 
	
		
			
				|  |  | +        this.eventPublisher = applicationEventPublisher;
 | 
	
		
			
				|  |  | +    }
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +    public void setAuthenticationManager(AuthenticationManager newManager) {
 | 
	
		
			
				|  |  | +        this.authenticationManager = newManager;
 | 
	
		
			
				|  |  | +    }
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +    public void setMessageSource(MessageSource messageSource) {
 | 
	
		
			
				|  |  | +        this.messages = new MessageSourceAccessor(messageSource);
 | 
	
		
			
				|  |  | +    }
 | 
	
		
			
				|  |  | +
 | 
	
		
			
				|  |  | +    /**
 | 
	
		
			
				|  |  | +     * By rejecting public invocations (and setting this property to
 | 
	
		
			
				|  |  | +     * <code>true</code>), essentially you are ensuring that every secure
 | 
	
		
			
				|  |  | +     * object invocation advised by <code>AbstractSecurityInterceptor</code>
 | 
	
		
			
				|  |  | +     * has a configuration attribute defined. This is useful to ensure a "fail
 | 
	
		
			
				|  |  | +     * safe" mode where undeclared secure objects will be rejected and
 | 
	
		
			
				|  |  | +     * configuration omissions detected early. An
 | 
	
		
			
				|  |  | +     * <code>IllegalArgumentException</code> will be thrown by the
 | 
	
		
			
				|  |  | +     * <code>AbstractSecurityInterceptor</code> if you set this property to
 | 
	
		
			
				|  |  | +     * <code>true</code> and an attempt is made to invoke a secure object that
 | 
	
		
			
				|  |  | +     * has no configuration attributes.
 | 
	
		
			
				|  |  |  	 *
 | 
	
		
			
				|  |  | -	 * @return the type of secure object the subclass provides services for
 | 
	
		
			
				|  |  | -	 */
 | 
	
		
			
				|  |  | -	public abstract Class getSecureObjectClass();
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -	public boolean isAlwaysReauthenticate() {
 | 
	
		
			
				|  |  | -		return alwaysReauthenticate;
 | 
	
		
			
				|  |  | -	}
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -	public boolean isRejectPublicInvocations() {
 | 
	
		
			
				|  |  | -		return rejectPublicInvocations;
 | 
	
		
			
				|  |  | -	}
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -	public boolean isValidateConfigAttributes() {
 | 
	
		
			
				|  |  | -		return validateConfigAttributes;
 | 
	
		
			
				|  |  | -	}
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -	public abstract ObjectDefinitionSource obtainObjectDefinitionSource();
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -	public void setAccessDecisionManager(AccessDecisionManager accessDecisionManager) {
 | 
	
		
			
				|  |  | -		this.accessDecisionManager = accessDecisionManager;
 | 
	
		
			
				|  |  | -	}
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -	public void setAfterInvocationManager(AfterInvocationManager afterInvocationManager) {
 | 
	
		
			
				|  |  | -		this.afterInvocationManager = afterInvocationManager;
 | 
	
		
			
				|  |  | -	}
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -	/**
 | 
	
		
			
				|  |  | -	 * Indicates whether the <code>AbstractSecurityInterceptor</code> should
 | 
	
		
			
				|  |  | -	 * ignore the {@link Authentication#isAuthenticated()} property. Defaults to
 | 
	
		
			
				|  |  | -	 * <code>false</code>, meaning by default the
 | 
	
		
			
				|  |  | -	 * <code>Authentication.isAuthenticated()</code> property is trusted and
 | 
	
		
			
				|  |  | -	 * re-authentication will not occur if the principal has already been
 | 
	
		
			
				|  |  | -	 * authenticated.
 | 
	
		
			
				|  |  | -	 *
 | 
	
		
			
				|  |  | -	 * @param alwaysReauthenticate <code>true</code> to force
 | 
	
		
			
				|  |  | -	 * <code>AbstractSecurityInterceptor</code> to disregard the value of
 | 
	
		
			
				|  |  | -	 * <code>Authentication.isAuthenticated()</code> and always
 | 
	
		
			
				|  |  | -	 * re-authenticate the request (defaults to <code>false</code>).
 | 
	
		
			
				|  |  | -	 */
 | 
	
		
			
				|  |  | -	public void setAlwaysReauthenticate(boolean alwaysReauthenticate) {
 | 
	
		
			
				|  |  | -		this.alwaysReauthenticate = alwaysReauthenticate;
 | 
	
		
			
				|  |  | -	}
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -	public void setApplicationEventPublisher(ApplicationEventPublisher applicationEventPublisher) {
 | 
	
		
			
				|  |  | -		this.eventPublisher = applicationEventPublisher;
 | 
	
		
			
				|  |  | -	}
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -	public void setAuthenticationManager(AuthenticationManager newManager) {
 | 
	
		
			
				|  |  | -		this.authenticationManager = newManager;
 | 
	
		
			
				|  |  | -	}
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -	public void setMessageSource(MessageSource messageSource) {
 | 
	
		
			
				|  |  | -		this.messages = new MessageSourceAccessor(messageSource);
 | 
	
		
			
				|  |  | -	}
 | 
	
		
			
				|  |  | -
 | 
	
		
			
				|  |  | -	/**
 | 
	
		
			
				|  |  | -	 * By rejecting public invocations (and setting this property to
 | 
	
		
			
				|  |  | -	 * <code>true</code>), essentially you are ensuring that every secure
 | 
	
		
			
				|  |  | -	 * object invocation advised by <code>AbstractSecurityInterceptor</code>
 | 
	
		
			
				|  |  | -	 * has a configuration attribute defined. This is useful to ensure a "fail
 | 
	
		
			
				|  |  | -	 * safe" mode where undeclared secure objects will be rejected and
 | 
	
		
			
				|  |  | -	 * configuration omissions detected early. An
 | 
	
		
			
				|  |  | -	 * <code>IllegalArgumentException</code> will be thrown by the
 | 
	
		
			
				|  |  | -	 * <code>AbstractSecurityInterceptor</code> if you set this property to
 | 
	
		
			
				|  |  | -	 * <code>true</code> and an attempt is made to invoke a secure object that
 | 
	
		
			
				|  |  | -	 * has no configuration attributes.
 | 
	
		
			
				|  |  | -	 *
 | 
	
		
			
				|  |  | -	 * @param rejectPublicInvocations set to <code>true</code> to reject
 | 
	
		
			
				|  |  | -	 * invocations of secure objects that have no configuration attributes (by
 | 
	
		
			
				|  |  | -	 * default it is <code>false</code> which treats undeclared secure objects
 | 
	
		
			
				|  |  | -	 * as "public" or unauthorized)
 | 
	
		
			
				|  |  | -	 */
 | 
	
		
			
				|  |  | +     * @param rejectPublicInvocations set to <code>true</code> to reject
 | 
	
		
			
				|  |  | +     * invocations of secure objects that have no configuration attributes (by
 | 
	
		
			
				|  |  | +     * default it is <code>false</code> which treats undeclared secure objects
 | 
	
		
			
				|  |  | +     * as "public" or unauthorized)
 | 
	
		
			
				|  |  | +     */
 | 
	
		
			
				|  |  |  	public void setRejectPublicInvocations(boolean rejectPublicInvocations) {
 | 
	
		
			
				|  |  |  		this.rejectPublicInvocations = rejectPublicInvocations;
 | 
	
		
			
				|  |  |  	}
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -	public void setRunAsManager(RunAsManager runAsManager) {
 | 
	
		
			
				|  |  | -		this.runAsManager = runAsManager;
 | 
	
		
			
				|  |  | -	}
 | 
	
		
			
				|  |  | +    public void setRunAsManager(RunAsManager runAsManager) {
 | 
	
		
			
				|  |  | +        this.runAsManager = runAsManager;
 | 
	
		
			
				|  |  | +    }
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -	public void setValidateConfigAttributes(boolean validateConfigAttributes) {
 | 
	
		
			
				|  |  | -		this.validateConfigAttributes = validateConfigAttributes;
 | 
	
		
			
				|  |  | -	}
 | 
	
		
			
				|  |  | +    public void setValidateConfigAttributes(boolean validateConfigAttributes) {
 | 
	
		
			
				|  |  | +        this.validateConfigAttributes = validateConfigAttributes;
 | 
	
		
			
				|  |  | +    }
 | 
	
		
			
				|  |  |  
 | 
	
		
			
				|  |  | -	private void publishEvent(ApplicationEvent event) {
 | 
	
		
			
				|  |  | +    private void publishEvent(ApplicationEvent event) {
 | 
	
		
			
				|  |  |  		if (this.eventPublisher != null) {
 | 
	
		
			
				|  |  |  			this.eventPublisher.publishEvent(event);
 | 
	
		
			
				|  |  |  		}
 |