Uses of Interface
com.broadleafcommerce.data.tracking.core.policy.PolicyUtils
Packages that use PolicyUtils
Package
Description
-
Uses of PolicyUtils in com.broadleafcommerce.data.tracking.core.mapping
Methods in com.broadleafcommerce.data.tracking.core.mapping that return PolicyUtilsModifier and TypeMethodDescriptionprotected PolicyUtilsContextStateBuilder.getPolicyUtils()protected PolicyUtilsDefaultTrackableDomainMapperMemberSupport.getPolicyUtils()Methods in com.broadleafcommerce.data.tracking.core.mapping with parameters of type PolicyUtilsModifier and TypeMethodDescriptionvoidContextStateBuilder.setPolicyUtils(PolicyUtils policyUtils) voidDefaultTrackableDomainMapperMemberSupport.setPolicyUtils(PolicyUtils policyUtils) -
Uses of PolicyUtils in com.broadleafcommerce.data.tracking.core.policy.autoconfigure
Methods in com.broadleafcommerce.data.tracking.core.policy.autoconfigure with parameters of type PolicyUtilsModifier and TypeMethodDescriptionPolicyAutoConfiguration.policyEvaluator(PolicyUtils policyUtils) -
Uses of PolicyUtils in com.broadleafcommerce.data.tracking.core.policy.trackable
Subinterfaces of PolicyUtils in com.broadleafcommerce.data.tracking.core.policy.trackableModifier and TypeInterfaceDescriptioninterfaceVersion of PolicyUtils capable of validating request values against business rules related to mutability and visibility of tenant related information.Classes in com.broadleafcommerce.data.tracking.core.policy.trackable that implement PolicyUtilsMethods in com.broadleafcommerce.data.tracking.core.policy.trackable that return PolicyUtilsConstructors in com.broadleafcommerce.data.tracking.core.policy.trackable with parameters of type PolicyUtils -
Uses of PolicyUtils in com.broadleafcommerce.data.tracking.core.policy.trackable.marketplace.vendor
Classes in com.broadleafcommerce.data.tracking.core.policy.trackable.marketplace.vendor that implement PolicyUtilsModifier and TypeClassDescriptionclassAn extension ofDefaultTrackablePolicyUtilsthat understands what vendor(s) the current authentication is restricted to (including consideration for the current policy requirements) and can enforce access control accordingly.