import org.apache.shiro.authz.Permission;
import org.onap.aaf.cadi.Access;
import org.onap.aaf.cadi.Access.Level;
-import org.slf4j.Logger;
-import org.slf4j.LoggerFactory;
+
/**
* We treat "roles" and "permissions" in a similar way for first pass.
*
public class AAFAuthorizationInfo implements AuthorizationInfo {
private static final long serialVersionUID = -4805388954462426018L;
- final static Logger logger = LoggerFactory.getLogger(AAFAuthorizationInfo.class);
-
private Access access;
private Principal bait;
private List<org.onap.aaf.cadi.Permission> pond;
this.pond = pond;
sPerms=null;
oPerms=null;
-
}
public Principal principal() {
@Override
public Collection<Permission> getObjectPermissions() {
-// access.log(Level.DEBUG, "AAFAuthorizationInfo.getObjectPermissions");
+ access.log(Level.DEBUG, "AAFAuthorizationInfo.getObjectPermissions");
synchronized(bait) {
if(oPerms == null) {
oPerms = new ArrayList<Permission>();
@Override
public Collection<String> getRoles() {
+ access.log(Level.INFO,"AAFAuthorizationInfo.getRoles");
// Until we decide to make Roles available, tie into String based permissions.
return getStringPermissions();
}
@Override
public Collection<String> getStringPermissions() {
+ access.log(Level.INFO,"AAFAuthorizationInfo.getStringPermissions");
synchronized(bait) {
if(sPerms == null) {
sPerms = new ArrayList<String>();
for(org.onap.aaf.cadi.Permission p : pond) {
sPerms.add(p.getKey().replace("|",":"));
-// System.out.println("Replacing | to :" + p.getKey().replace("|",":"));
+ access.printf(Level.INFO,"the user has %s",p.getKey());
}
}
}