import java.util.ArrayList;
import java.util.Collections;
import java.util.List;
+import java.util.Map;
import org.apache.commons.logging.Log;
import org.apache.commons.logging.LogFactory;
import org.springframework.security.Authentication;
import org.springframework.security.GrantedAuthority;
import org.springframework.security.GrantedAuthorityImpl;
+import org.springframework.security.context.SecurityContextHolder;
import org.springframework.security.userdetails.User;
import org.springframework.security.userdetails.UserDetails;
private static final long serialVersionUID = 1L;
private final static Log log = LogFactory.getLog(ArgeoUserDetails.class);
- private final List<UserNature> userNatures;
+ private final Map<String, UserNature> userNatures;
private final List<String> roles;
- public ArgeoUserDetails(String username, List<UserNature> userNatures,
- String password, GrantedAuthority[] authorities)
- throws IllegalArgumentException {
+ public ArgeoUserDetails(String username,
+ Map<String, UserNature> userNatures, String password,
+ GrantedAuthority[] authorities) throws IllegalArgumentException {
super(username, password, true, true, true, true, authorities);
- this.userNatures = Collections.unmodifiableList(userNatures);
+ this.userNatures = Collections.unmodifiableMap(userNatures);
// Roles
this.roles = Collections.unmodifiableList(addAuthoritiesToRoles(
.getPassword(), rolesToAuthorities(argeoUser.getRoles()));
}
- public List<UserNature> getUserNatures() {
+ public Map<String, UserNature> getUserNatures() {
return userNatures;
}
- public void updateUserNatures(List<UserNature> userNaturesData) {
- UserNature.updateUserNaturesWithCheck(userNatures, userNaturesData);
+ public void updateUserNatures(Map<String, UserNature> userNaturesData) {
+ SimpleArgeoUser
+ .updateUserNaturesWithCheck(userNatures, userNaturesData);
}
public List<String> getRoles() {
}
/** The provided list, for chaining using {@link Collections} */
- protected static List<String> addAuthoritiesToRoles(
+ public static List<String> addAuthoritiesToRoles(
GrantedAuthority[] authorities, List<String> roles) {
for (GrantedAuthority authority : authorities) {
roles.add(authority.getAuthority());
return roles;
}
- protected static GrantedAuthority[] rolesToAuthorities(List<String> roles) {
+ public static GrantedAuthority[] rolesToAuthorities(List<String> roles) {
GrantedAuthority[] arr = new GrantedAuthority[roles.size()];
for (int i = 0; i < roles.size(); i++) {
String role = roles.get(i);
} else {
SimpleArgeoUser argeoUser = new SimpleArgeoUser();
argeoUser.setUsername(userDetails.getUsername());
- addAuthoritiesToRoles(userDetails.getAuthorities(), argeoUser
- .getRoles());
+ addAuthoritiesToRoles(userDetails.getAuthorities(),
+ argeoUser.getRoles());
return argeoUser;
}
}
+ /** Creates an argeo user based on spring authentication */
public static ArgeoUser asArgeoUser(Authentication authentication) {
if (authentication == null)
return null;
if (authentication.getPrincipal() instanceof ArgeoUser) {
- return new SimpleArgeoUser((ArgeoUser) authentication
- .getPrincipal());
+ return new SimpleArgeoUser(
+ (ArgeoUser) authentication.getPrincipal());
} else {
SimpleArgeoUser argeoUser = new SimpleArgeoUser();
argeoUser.setUsername(authentication.getName());
- addAuthoritiesToRoles(authentication.getAuthorities(), argeoUser
- .getRoles());
+ addAuthoritiesToRoles(authentication.getAuthorities(),
+ argeoUser.getRoles());
return argeoUser;
}
}
+
+ /** The Spring security context as an argeo user */
+ public static ArgeoUser securityContextUser() {
+ Authentication authentication = SecurityContextHolder.getContext()
+ .getAuthentication();
+ ArgeoUser argeoUser = ArgeoUserDetails.asArgeoUser(authentication);
+ return argeoUser;
+ }
}