X-Git-Url: https://gerrit.onap.org/r/gitweb?a=blobdiff_plain;f=shiro%2Fsrc%2Fmain%2Fjava%2Forg%2Fonap%2Faaf%2Fcadi%2Fshiro%2FAAFAuthorizationInfo.java;h=fc0f4ffae1cc542c6d0e870bc8591e9e11f3e526;hb=4a698c2e3d926fd69673eea8b15a78bc7770a29c;hp=f1bfd3cef294a9e0fe78b0a02523b26c1b3739d5;hpb=a649fd1b3c8308b4c7cc2018965c93bff9d7eb54;p=aaf%2Fcadi.git diff --git a/shiro/src/main/java/org/onap/aaf/cadi/shiro/AAFAuthorizationInfo.java b/shiro/src/main/java/org/onap/aaf/cadi/shiro/AAFAuthorizationInfo.java index f1bfd3c..fc0f4ff 100644 --- a/shiro/src/main/java/org/onap/aaf/cadi/shiro/AAFAuthorizationInfo.java +++ b/shiro/src/main/java/org/onap/aaf/cadi/shiro/AAFAuthorizationInfo.java @@ -29,8 +29,7 @@ import org.apache.shiro.authz.AuthorizationInfo; import org.apache.shiro.authz.Permission; import org.onap.aaf.cadi.Access; import org.onap.aaf.cadi.Access.Level; -import org.slf4j.Logger; -import org.slf4j.LoggerFactory; + /** * We treat "roles" and "permissions" in a similar way for first pass. * @@ -40,8 +39,6 @@ import org.slf4j.LoggerFactory; public class AAFAuthorizationInfo implements AuthorizationInfo { private static final long serialVersionUID = -4805388954462426018L; - final static Logger logger = LoggerFactory.getLogger(AAFAuthorizationInfo.class); - private Access access; private Principal bait; private List pond; @@ -54,7 +51,6 @@ public class AAFAuthorizationInfo implements AuthorizationInfo { this.pond = pond; sPerms=null; oPerms=null; - } public Principal principal() { @@ -63,7 +59,7 @@ public class AAFAuthorizationInfo implements AuthorizationInfo { @Override public Collection getObjectPermissions() { -// access.log(Level.DEBUG, "AAFAuthorizationInfo.getObjectPermissions"); + access.log(Level.DEBUG, "AAFAuthorizationInfo.getObjectPermissions"); synchronized(bait) { if(oPerms == null) { oPerms = new ArrayList(); @@ -77,18 +73,20 @@ public class AAFAuthorizationInfo implements AuthorizationInfo { @Override public Collection getRoles() { + access.log(Level.INFO,"AAFAuthorizationInfo.getRoles"); // Until we decide to make Roles available, tie into String based permissions. return getStringPermissions(); } @Override public Collection getStringPermissions() { + access.log(Level.INFO,"AAFAuthorizationInfo.getStringPermissions"); synchronized(bait) { if(sPerms == null) { sPerms = new ArrayList(); for(org.onap.aaf.cadi.Permission p : pond) { sPerms.add(p.getKey().replace("|",":")); -// System.out.println("Replacing | to :" + p.getKey().replace("|",":")); + access.printf(Level.INFO,"the user has %s",p.getKey()); } } }