Skip to content

Commit e34412b

Browse files
committed
Fixed Issue With Permission Manager Test
Updated Dependencies Fixed Other Small Issues Signed-off-by: Joshua Gager <jlgager@jgcomptech.com>
1 parent 53c5da6 commit e34412b

File tree

5 files changed

+45
-53
lines changed

5 files changed

+45
-53
lines changed

pom.xml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -161,7 +161,7 @@
161161
<plugin>
162162
<groupId>org.apache.maven.plugins</groupId>
163163
<artifactId>maven-clean-plugin</artifactId>
164-
<version>3.0.0</version>
164+
<version>3.1.0</version>
165165
<executions>
166166
<execution>
167167
<id>auto-clean</id>
@@ -302,13 +302,13 @@
302302
<dependency>
303303
<groupId>net.java.dev.jna</groupId>
304304
<artifactId>jna-platform</artifactId>
305-
<version>4.5.2</version>
305+
<version>5.0.0</version>
306306
</dependency>
307307
<!-- https://mvnrepository.com/artifact/net.java.dev.jna/jna -->
308308
<dependency>
309309
<groupId>net.java.dev.jna</groupId>
310310
<artifactId>jna</artifactId>
311-
<version>4.5.2</version>
311+
<version>5.0.0</version>
312312
</dependency>
313313
<!-- https://mvnrepository.com/artifact/junit/junit -->
314314
<dependency>

src/main/java/com/jgcomptech/tools/authc/AuthManager.java

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -664,7 +664,7 @@ public boolean getUserVerification(final boolean retryLoginOnFailure) {
664664
* Returns a list of the current existing roles.
665665
* @return a list of the current existing roles
666666
*/
667-
public HashMap<String, UserRole> getRoles() { return userRoleManager.getUserRoles(); }
667+
public Map<String, UserRole> getRoles() { return userRoleManager.getUserRoles(); }
668668

669669
/**
670670
* Returns the specified role.

src/main/java/com/jgcomptech/tools/authc/UserRoleManager.java

Lines changed: 6 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -2,9 +2,7 @@
22

33
import com.jgcomptech.tools.authz.PermissionManager;
44

5-
import java.util.Arrays;
6-
import java.util.HashMap;
7-
import java.util.HashSet;
5+
import java.util.*;
86
import java.util.stream.Collectors;
97

108
/**
@@ -40,10 +38,10 @@ private UserRoleManager() {
4038
SystemUserRoles.BASIC.getRole().modify().add(Read);
4139

4240
addExistingUserRole(SystemUserRoles.ADMIN.getRole());
43-
addExistingUserRole(SystemUserRoles.EDITOR.role);
44-
addExistingUserRole(SystemUserRoles.AUTHOR.role);
45-
addExistingUserRole(SystemUserRoles.BASIC.role);
46-
addExistingUserRole(SystemUserRoles.NONE.role);
41+
addExistingUserRole(SystemUserRoles.EDITOR.getRole());
42+
addExistingUserRole(SystemUserRoles.AUTHOR.getRole());
43+
addExistingUserRole(SystemUserRoles.BASIC.getRole());
44+
addExistingUserRole(SystemUserRoles.NONE.getRole());
4745
}
4846

4947
/** A List of the implemented system user roles. */
@@ -109,7 +107,7 @@ public void addExistingUserRole(final UserRole role) {
109107
* Returns a list of the current existing user roles.
110108
* @return a list of the current existing user roles
111109
*/
112-
public HashMap<String, UserRole> getUserRoles() { return userRoles; }
110+
public Map<String, UserRole> getUserRoles() { return Collections.unmodifiableMap(userRoles); }
113111

114112
/**
115113
* Returns the specified user role.

src/main/java/com/jgcomptech/tools/authz/PermissionManager.java

Lines changed: 19 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -7,10 +7,7 @@
77
import com.jgcomptech.tools.events.EventTarget;
88
import com.jgcomptech.tools.events.PermissionEvent;
99

10-
import java.util.Arrays;
11-
import java.util.HashMap;
12-
import java.util.HashSet;
13-
import java.util.Set;
10+
import java.util.*;
1411
import java.util.stream.Collectors;
1512

1613
/**
@@ -38,10 +35,10 @@ public static synchronized PermissionManager getInstance() {
3835
if(instance == null) {
3936
instance = new PermissionManager();
4037
instance.permissions = new HashMap<>();
41-
instance.addCustomPermission(SystemPermissions.Admin.name, null);
42-
instance.addCustomPermission(SystemPermissions.Edit.name, null);
43-
instance.addCustomPermission(SystemPermissions.Create.name, null);
44-
instance.addCustomPermission(SystemPermissions.Read.name, null);
38+
instance.addCustomPermission(SystemPermissions.Admin.getName(), null);
39+
instance.addCustomPermission(SystemPermissions.Edit.getName(), null);
40+
instance.addCustomPermission(SystemPermissions.Create.getName(), null);
41+
instance.addCustomPermission(SystemPermissions.Read.getName(), null);
4542

4643
try {
4744
instance.eventPermissionsApplied =
@@ -162,76 +159,76 @@ public void disableDebugLogging() {
162159
* Returns true if Admin permission is enabled.
163160
* @return true if Admin permission is enabled
164161
*/
165-
public boolean isAdminPermissionEnabled() { return permissions.get(SystemPermissions.Admin.name).isEnabled(); }
162+
public boolean isAdminPermissionEnabled() { return permissions.get(SystemPermissions.Admin.getName()).isEnabled(); }
166163
/**
167164
* Returns true if Edit permission is enabled.
168165
* @return true if Edit permission is enabled
169166
*/
170-
public boolean isEditPermissionEnabled() { return permissions.get(SystemPermissions.Edit.name).isEnabled(); }
167+
public boolean isEditPermissionEnabled() { return permissions.get(SystemPermissions.Edit.getName()).isEnabled(); }
171168
/**
172169
* Returns true if Create permission is enabled.
173170
* @return true if Create permission is enabled
174171
*/
175-
public boolean isCreatePermissionEnabled() { return permissions.get(SystemPermissions.Create.name).isEnabled(); }
172+
public boolean isCreatePermissionEnabled() { return permissions.get(SystemPermissions.Create.getName()).isEnabled(); }
176173
/**
177174
* Returns true if Read permission is enabled.
178175
* @return true if Read permission is enabled
179176
*/
180-
public boolean isReadPermissionEnabled() { return permissions.get(SystemPermissions.Read.name).isEnabled(); }
177+
public boolean isReadPermissionEnabled() { return permissions.get(SystemPermissions.Read.getName()).isEnabled(); }
181178

182179
/**
183180
* Manually sets the status of the Admin permission.
184181
* @param value the value to set
185182
*/
186183
public void setAdminPermission(final boolean value) {
187-
permissions.get(SystemPermissions.Admin.name).setEnabled(value); }
184+
permissions.get(SystemPermissions.Admin.getName()).setEnabled(value); }
188185
/**
189186
* Manually sets the status of the Edit permission.
190187
* @param value the value to set
191188
*/
192189
public void setEditPermission(final boolean value) {
193-
permissions.get(SystemPermissions.Edit.name).setEnabled(value); }
190+
permissions.get(SystemPermissions.Edit.getName()).setEnabled(value); }
194191
/**
195192
* Manually sets the status of the Create permission.
196193
* @param value the value to set
197194
*/
198195
public void setCreatePermission(final boolean value) {
199-
permissions.get(SystemPermissions.Create.name).setEnabled(value); }
196+
permissions.get(SystemPermissions.Create.getName()).setEnabled(value); }
200197
/**
201198
* Manually sets the status of the Read permission.
202199
* @param value the value to set
203200
*/
204201
public void setReadPermission(final boolean value) {
205-
permissions.get(SystemPermissions.Read.name).setEnabled(value); }
202+
permissions.get(SystemPermissions.Read.getName()).setEnabled(value); }
206203

207204
/**
208205
* Returns the Admin permission.
209206
* @return the permission object
210207
*/
211-
public Permission getAdminPermission() { return permissions.get(SystemPermissions.Admin.name); }
208+
public Permission getAdminPermission() { return permissions.get(SystemPermissions.Admin.getName()); }
212209
/**
213210
* Returns the Edit permission.
214211
* @return the permission object
215212
*/
216-
public Permission getEditPermission() { return permissions.get(SystemPermissions.Edit.name); }
213+
public Permission getEditPermission() { return permissions.get(SystemPermissions.Edit.getName()); }
217214
/**
218215
* Returns the Create permission.
219216
* @return the permission object
220217
*/
221-
public Permission getCreatePermission() { return permissions.get(SystemPermissions.Create.name); }
218+
public Permission getCreatePermission() { return permissions.get(SystemPermissions.Create.getName()); }
222219
/**
223220
* Returns the Read permission.
224221
* @return the permission object
225222
*/
226-
public Permission getReadPermission() { return permissions.get(SystemPermissions.Read.name); }
223+
public Permission getReadPermission() { return permissions.get(SystemPermissions.Read.getName()); }
227224

228225
//endregion System Permissions
229226

230227
/**
231228
* Returns a HashMap of all existing permission objects.
232229
* @return a HashMap of all existing permission objects
233230
*/
234-
public HashMap<String, Permission> getPermissions() { return permissions; }
231+
public Map<String, Permission> getPermissions() { return permissions; }
235232

236233
/**
237234
* Returns a list of names of existing permissions.
@@ -450,10 +447,7 @@ public void loadPermissions(final boolean enableAll) {
450447
* @since 1.5.0 now uses a parallel stream allowing a large list of permissions
451448
*/
452449
public void loadPermissions(final UserRole userRole) {
453-
getAdminPermission().disable();
454-
getEditPermission().disable();
455-
getCreatePermission().disable();
456-
getReadPermission().disable();
450+
permissions.values().parallelStream().forEach(Permission::disable);
457451
userRole.getPermissions().parallelStream().forEach(this::enablePermission);
458452
eventPermissionsApplied.fireEvent(this, userRole);
459453
}

src/test/java/com/jgcomptech/tools/authz/PermissionManagerTest.java

Lines changed: 16 additions & 16 deletions
Original file line numberDiff line numberDiff line change
@@ -58,31 +58,31 @@ public void testPermissionManager() {
5858
assertTrue(manager.isCreatePermissionEnabled());
5959
assertTrue(manager.isReadPermissionEnabled());
6060

61-
manager.loadPermissions(UserRoleManager.SystemUserRoles.NONE);
62-
assertFalse(manager.isAdminPermissionEnabled());
63-
assertFalse(manager.isEditPermissionEnabled());
64-
assertFalse(manager.isCreatePermissionEnabled());
65-
assertFalse(manager.isReadPermissionEnabled());
6661
manager.loadPermissions(UserRoleManager.SystemUserRoles.ADMIN);
67-
assertTrue(manager.isAdminPermissionEnabled());
68-
assertTrue(manager.isEditPermissionEnabled());
69-
assertTrue(manager.isCreatePermissionEnabled());
7062
assertTrue(manager.isReadPermissionEnabled());
71-
manager.loadPermissions(UserRoleManager.SystemUserRoles.EDITOR);
72-
assertFalse(manager.isAdminPermissionEnabled());
73-
assertTrue(manager.isEditPermissionEnabled());
7463
assertTrue(manager.isCreatePermissionEnabled());
64+
assertTrue(manager.isEditPermissionEnabled());
65+
assertTrue(manager.isAdminPermissionEnabled());
66+
manager.loadPermissions(UserRoleManager.SystemUserRoles.EDITOR);
7567
assertTrue(manager.isReadPermissionEnabled());
76-
manager.loadPermissions(UserRoleManager.SystemUserRoles.AUTHOR);
77-
assertFalse(manager.isAdminPermissionEnabled());
78-
assertFalse(manager.isEditPermissionEnabled());
7968
assertTrue(manager.isCreatePermissionEnabled());
69+
assertTrue(manager.isEditPermissionEnabled());
70+
assertFalse(manager.isAdminPermissionEnabled());
71+
manager.loadPermissions(UserRoleManager.SystemUserRoles.AUTHOR);
8072
assertTrue(manager.isReadPermissionEnabled());
81-
manager.loadPermissions(UserRoleManager.SystemUserRoles.BASIC);
73+
assertTrue(manager.isCreatePermissionEnabled());
74+
assertFalse(manager.isEditPermissionEnabled());
8275
assertFalse(manager.isAdminPermissionEnabled());
76+
manager.loadPermissions(UserRoleManager.SystemUserRoles.BASIC);
77+
assertTrue(manager.isReadPermissionEnabled());
78+
assertFalse(manager.isCreatePermissionEnabled());
8379
assertFalse(manager.isEditPermissionEnabled());
80+
assertFalse(manager.isAdminPermissionEnabled());
81+
manager.loadPermissions(UserRoleManager.SystemUserRoles.NONE);
82+
assertFalse(manager.isReadPermissionEnabled());
8483
assertFalse(manager.isCreatePermissionEnabled());
85-
assertTrue(manager.isReadPermissionEnabled());
84+
assertFalse(manager.isEditPermissionEnabled());
85+
assertFalse(manager.isAdminPermissionEnabled());
8686

8787
assertEquals(4, manager.getPermissionsNames().size());
8888

0 commit comments

Comments
 (0)