Uses of Interface
com.broadleafcommerce.data.tracking.core.policy.PolicyUtils
Packages that use PolicyUtils
Package
Description
-
Uses of PolicyUtils in com.broadleafcommerce.data.tracking.core.mapping
Methods in com.broadleafcommerce.data.tracking.core.mapping that return PolicyUtilsModifier and TypeMethodDescriptionprotected PolicyUtils
ContextStateBuilder.getPolicyUtils()
protected PolicyUtils
DefaultTrackableDomainMapperMemberSupport.getPolicyUtils()
Methods in com.broadleafcommerce.data.tracking.core.mapping with parameters of type PolicyUtilsModifier and TypeMethodDescriptionvoid
ContextStateBuilder.setPolicyUtils
(PolicyUtils policyUtils) void
DefaultTrackableDomainMapperMemberSupport.setPolicyUtils
(PolicyUtils policyUtils) -
Uses of PolicyUtils in com.broadleafcommerce.data.tracking.core.policy.autoconfigure
Methods in com.broadleafcommerce.data.tracking.core.policy.autoconfigure with parameters of type PolicyUtilsModifier and TypeMethodDescriptionPolicyAutoConfiguration.policyEvaluator
(PolicyUtils policyUtils) -
Uses of PolicyUtils in com.broadleafcommerce.data.tracking.core.policy.trackable
Subinterfaces of PolicyUtils in com.broadleafcommerce.data.tracking.core.policy.trackableModifier and TypeInterfaceDescriptioninterface
Version of PolicyUtils capable of validating request values against business rules related to mutability and visibility of tenant related information.Classes in com.broadleafcommerce.data.tracking.core.policy.trackable that implement PolicyUtilsMethods in com.broadleafcommerce.data.tracking.core.policy.trackable that return PolicyUtilsConstructors in com.broadleafcommerce.data.tracking.core.policy.trackable with parameters of type PolicyUtils -
Uses of PolicyUtils in com.broadleafcommerce.data.tracking.core.policy.trackable.marketplace.vendor
Classes in com.broadleafcommerce.data.tracking.core.policy.trackable.marketplace.vendor that implement PolicyUtilsModifier and TypeClassDescriptionclass
An extension ofDefaultTrackablePolicyUtils
that understands what vendor(s) the current authentication is restricted to (including consideration for the current policy requirements) and can enforce access control accordingly.