Package hudson.security
Class AuthorizationStrategy.Unsecured
java.lang.Object
hudson.model.AbstractDescribableImpl<AuthorizationStrategy>
hudson.security.AuthorizationStrategy
hudson.security.AuthorizationStrategy.Unsecured
- All Implemented Interfaces:
ExtensionPoint
,Describable<AuthorizationStrategy>
,Serializable
- Enclosing class:
- AuthorizationStrategy
public static final class AuthorizationStrategy.Unsecured
extends AuthorizationStrategy
implements Serializable
- See Also:
-
Nested Class Summary
Modifier and TypeClassDescriptionstatic final class
Nested classes/interfaces inherited from class hudson.security.AuthorizationStrategy
AuthorizationStrategy.Unsecured
Nested classes/interfaces inherited from interface hudson.ExtensionPoint
ExtensionPoint.LegacyInstancesAreScopedToHudson
-
Field Summary
Fields inherited from class hudson.security.AuthorizationStrategy
LIST, UNSECURED
-
Constructor Summary
-
Method Summary
Modifier and TypeMethodDescriptionReturns the list of all group/role names used in this authorization strategy, and the ACL returned from theAuthorizationStrategy.getRootACL()
method.Methods inherited from class hudson.security.AuthorizationStrategy
all, getACL, getACL, getACL, getACL, getACL, getACL, getACL, getACL, getACL
Methods inherited from class hudson.model.AbstractDescribableImpl
getDescriptor
-
Constructor Details
-
Unsecured
public Unsecured()
-
-
Method Details
-
getRootACL
Description copied from class:AuthorizationStrategy
Returns the instance ofACL
where all the otherACL
instances for all the other model objects eventually delegate.IOW, this ACL will have the ultimate say on the access control.
- Specified by:
getRootACL
in classAuthorizationStrategy
-
getGroups
Description copied from class:AuthorizationStrategy
Returns the list of all group/role names used in this authorization strategy, and the ACL returned from theAuthorizationStrategy.getRootACL()
method.This method is used by
ContainerAuthentication
to work around the servlet API issue that prevents us from enumerating roles that the user has.If such enumeration is impossible, do the best to list as many as possible, then return it. In the worst case, just return an empty list. Doing so would prevent users from using role names as group names (see JENKINS-2716 for such one such report.)
- Specified by:
getGroups
in classAuthorizationStrategy
- Returns:
- never null.
-