Example usage for com.liferay.portal.kernel.security.permission ActionKeys ASSIGN_MEMBERS

List of usage examples for com.liferay.portal.kernel.security.permission ActionKeys ASSIGN_MEMBERS

Introduction

In this page you can find the example usage for com.liferay.portal.kernel.security.permission ActionKeys ASSIGN_MEMBERS.

Prototype

String ASSIGN_MEMBERS

To view the source code for com.liferay.portal.kernel.security.permission ActionKeys ASSIGN_MEMBERS.

Click Source Link

Usage

From source file:com.liferay.exportimport.internal.staging.permission.StagingPermissionImpl.java

License:Open Source License

protected Boolean doHasPermission(PermissionChecker permissionChecker, Group group, String className,
        long classPK, String portletId, String actionId) throws Exception {

    if (!PropsValues.STAGING_LIVE_GROUP_LOCKING_ENABLED) {
        return null;
    }/* ww w.jav a2 s . c o  m*/

    if (!actionId.equals(ActionKeys.ACCESS) && !actionId.equals(ActionKeys.ACCESS_IN_CONTROL_PANEL)
            && !actionId.equals(ActionKeys.ADD_TO_PAGE) && !actionId.equals(ActionKeys.ASSIGN_MEMBERS)
            && !actionId.equals(ActionKeys.CONFIGURATION) && !actionId.equals(ActionKeys.CUSTOMIZE)
            && !actionId.equals(ActionKeys.DELETE) && !actionId.equals(ActionKeys.VIEW)
            && group.hasLocalOrRemoteStagingGroup()
            && (Validator.isNull(portletId) || group.isStagedPortlet(portletId))) {

        return false;
    } else {
        return null;
    }
}

From source file:com.liferay.password.policies.admin.web.internal.display.context.PasswordPolicyDisplayContext.java

License:Open Source License

public boolean hasAssignMembersPermission() {
    long passwordPolicyId = ParamUtil.getLong(_request, "passwordPolicyId");

    PasswordPolicy passwordPolicy = PasswordPolicyLocalServiceUtil.fetchPasswordPolicy(passwordPolicyId);

    if (passwordPolicy == null) {
        return false;
    }//from ww w . ja v  a2s. c o  m

    ThemeDisplay themeDisplay = (ThemeDisplay) _request.getAttribute(WebKeys.THEME_DISPLAY);

    return PasswordPolicyPermissionUtil.contains(themeDisplay.getPermissionChecker(),
            passwordPolicy.getPasswordPolicyId(), ActionKeys.ASSIGN_MEMBERS);
}

From source file:com.liferay.password.policies.admin.web.internal.portlet.configuration.icon.AssignMembersPortletConfigurationIcon.java

License:Open Source License

@Override
public boolean isShow(PortletRequest portletRequest) {
    try {/*  w ww .j a v  a 2  s  . c o  m*/
        ThemeDisplay themeDisplay = (ThemeDisplay) portletRequest.getAttribute(WebKeys.THEME_DISPLAY);

        if (PasswordPolicyPermissionUtil.contains(themeDisplay.getPermissionChecker(),
                _getPasswordPolicyId(portletRequest), ActionKeys.ASSIGN_MEMBERS)) {

            return true;
        }
    } catch (Exception e) {
    }

    return false;
}

From source file:com.liferay.site.memberships.web.internal.portlet.SiteMembershipsControlPanelEntry.java

License:Open Source License

@Override
protected boolean hasPermissionImplicitlyGranted(PermissionChecker permissionChecker, Group group,
        Portlet portlet) throws Exception {

    if (GroupPermissionUtil.contains(permissionChecker, group, ActionKeys.ASSIGN_MEMBERS)) {

        return true;
    }//  w w w  .j  ava  2  s  .c  om

    return super.hasPermissionImplicitlyGranted(permissionChecker, group, portlet);
}

From source file:com.liferay.user.groups.admin.web.internal.portlet.configuration.icon.AssignMembersPortletConfigurationIcon.java

License:Open Source License

@Override
public boolean isShow(PortletRequest portletRequest) {
    try {//from ww w. j  a va  2 s.co  m
        ThemeDisplay themeDisplay = (ThemeDisplay) portletRequest.getAttribute(WebKeys.THEME_DISPLAY);

        UserGroup userGroup = ActionUtil.getUserGroup(portletRequest);

        return UserGroupPermissionUtil.contains(themeDisplay.getPermissionChecker(), userGroup.getUserGroupId(),
                ActionKeys.ASSIGN_MEMBERS);
    } catch (Exception e) {
    }

    return false;
}

From source file:eu.gerhards.liferay.services.angular.service.impl.AngularGroupServiceImpl.java

License:Open Source License

public long[] checkGroups(long userId, long[] groupIds) throws PortalException {

    long[] oldGroupIds = null;

    PermissionChecker permissionChecker = getPermissionChecker();

    User user = null;/* w w  w  .j a  v a2s  .  co  m*/

    if (userId != CompanyConstants.SYSTEM) {

        // Add back any mandatory groups or groups that the administrator
        // does not have the rights to remove and check that he has the
        // permission to add a new group

        user = userPersistence.findByPrimaryKey(userId);

        List<Group> oldGroups = GroupLocalServiceUtil.getUserGroups(userId);

        oldGroupIds = new long[oldGroups.size()];

        for (int i = 0; i < oldGroups.size(); i++) {
            Group group = oldGroups.get(i);

            if (!ArrayUtil.contains(groupIds, group.getGroupId())
                    && (!GroupPermissionUtil.contains(permissionChecker, group, ActionKeys.ASSIGN_MEMBERS)
                            || SiteMembershipPolicyUtil.isMembershipProtected(permissionChecker,
                                    user.getUserId(), group.getGroupId())
                            || SiteMembershipPolicyUtil.isMembershipRequired(userId, group.getGroupId()))) {

                groupIds = ArrayUtil.append(groupIds, group.getGroupId());
            }

            oldGroupIds[i] = group.getGroupId();
        }
    }

    // Check that the administrator has the permission to add a new group
    // and that the group membership is allowed

    for (long groupId : groupIds) {
        if ((oldGroupIds != null) && ArrayUtil.contains(oldGroupIds, groupId)) {

            continue;
        }

        Group group = GroupLocalServiceUtil.getGroup(groupId);

        GroupPermissionUtil.check(permissionChecker, group, ActionKeys.ASSIGN_MEMBERS);
    }

    return groupIds;
}

From source file:eu.gerhards.liferay.services.angular.service.impl.AngularOrganizationServiceImpl.java

License:Open Source License

public long[] checkOrganizations(long userId, long[] organizationIds) throws PortalException {

    long[] oldOrganizationIds = null;

    PermissionChecker permissionChecker = getPermissionChecker();

    if (userId != CompanyConstants.SYSTEM) {

        // Add back any mandatory organizations or organizations that the
        // administrator does not have the rights to remove and check that
        // he has the permission to add a new organization

        List<Organization> oldOrganizations = OrganizationLocalServiceUtil.getUserOrganizations(userId);

        oldOrganizationIds = new long[oldOrganizations.size()];

        for (int i = 0; i < oldOrganizations.size(); i++) {
            Organization organization = oldOrganizations.get(i);

            if (!ArrayUtil.contains(organizationIds, organization.getOrganizationId())
                    && (!OrganizationPermissionUtil.contains(permissionChecker, organization,
                            ActionKeys.ASSIGN_MEMBERS)
                            || OrganizationMembershipPolicyUtil.isMembershipProtected(permissionChecker, userId,
                                    organization.getOrganizationId())
                            || OrganizationMembershipPolicyUtil.isMembershipRequired(userId,
                                    organization.getOrganizationId()))) {

                organizationIds = ArrayUtil.append(organizationIds, organization.getOrganizationId());
            }//from ww  w  .  ja  v a  2  s .c om

            oldOrganizationIds[i] = organization.getOrganizationId();
        }
    }

    // Check that the administrator has the permission to add a new
    // organization and that the organization membership is allowed

    for (long organizationId : organizationIds) {
        if ((oldOrganizationIds != null) && ArrayUtil.contains(oldOrganizationIds, organizationId)) {

            continue;
        }

        Organization organization = OrganizationLocalServiceUtil.getOrganization(organizationId);

        OrganizationPermissionUtil.check(permissionChecker, organization, ActionKeys.ASSIGN_MEMBERS);
    }

    return organizationIds;
}

From source file:eu.gerhards.liferay.services.angular.service.impl.AngularRoleServiceImpl.java

License:Open Source License

public long[] checkRoles(long userId, long[] roleIds) throws PortalException {

    long[] oldRoleIds = null;

    PermissionChecker permissionChecker = getPermissionChecker();

    if (userId != CompanyConstants.SYSTEM) {

        // Add back any mandatory roles or roles that the administrator does
        // not have the rights to remove and check that he has the
        // permission to add a new role

        List<Role> oldRoles = RoleLocalServiceUtil.getUserRoles(userId);

        oldRoleIds = new long[oldRoles.size()];

        for (int i = 0; i < oldRoles.size(); i++) {
            Role role = oldRoles.get(i);

            if (!ArrayUtil.contains(roleIds, role.getRoleId()) && (!RolePermissionUtil
                    .contains(permissionChecker, role.getRoleId(), ActionKeys.ASSIGN_MEMBERS)
                    || RoleMembershipPolicyUtil.isRoleRequired(userId, role.getRoleId()))) {

                roleIds = ArrayUtil.append(roleIds, role.getRoleId());
            }/*w w w  . j a  va 2s .com*/

            oldRoleIds[i] = role.getRoleId();
        }
    }

    // Check that the administrator has the permission to add a new role and
    // that the role membership is allowed

    for (long roleId : roleIds) {
        if ((oldRoleIds != null) && ArrayUtil.contains(oldRoleIds, roleId)) {

            continue;
        }

        RolePermissionUtil.check(permissionChecker, roleId, ActionKeys.ASSIGN_MEMBERS);
    }

    if (userId != CompanyConstants.SYSTEM) {
        return UsersAdminUtil.addRequiredRoles(userId, roleIds);
    }

    return roleIds;
}

From source file:eu.gerhards.liferay.services.angular.service.impl.AngularTeamServiceImpl.java

License:Open Source License

@Override
public void assignUserToTeam(long userId, long teamId) throws PortalException {

    _log.info("Assigning user to team ...");

    _log.debug("    ... security check ...");

    this.checkPersonalPermission(AngularActionKeys.ASSIGN_USER_TO_TEAM);

    TeamPermissionUtil.check(getPermissionChecker(), teamId, ActionKeys.ASSIGN_MEMBERS);

    _log.debug("    ... processing ...");

    TeamLocalServiceUtil.addUserTeam(userId, teamId);
}

From source file:eu.gerhards.liferay.services.angular.service.impl.AngularTeamServiceImpl.java

License:Open Source License

@Override
public void assignUserGroupTeam(long userGroupId, long teamId) throws PortalException {

    _log.info("Assigning user group with id " + userGroupId + " to team with id " + teamId);

    this.checkPersonalPermission(AngularActionKeys.ASSIGN_USER_TO_TEAM);

    GroupPermissionUtil.check(getPermissionChecker(), teamId, ActionKeys.ASSIGN_MEMBERS);

    _log.debug("    ... processing ...");

    TeamLocalServiceUtil.addUserGroupTeam(userGroupId, teamId);

}