List of usage examples for com.liferay.portal.kernel.security.permission ActionKeys ASSIGN_MEMBERS
String ASSIGN_MEMBERS
To view the source code for com.liferay.portal.kernel.security.permission ActionKeys ASSIGN_MEMBERS.
Click Source Link
From source file:com.liferay.exportimport.internal.staging.permission.StagingPermissionImpl.java
License:Open Source License
protected Boolean doHasPermission(PermissionChecker permissionChecker, Group group, String className, long classPK, String portletId, String actionId) throws Exception { if (!PropsValues.STAGING_LIVE_GROUP_LOCKING_ENABLED) { return null; }/* ww w.jav a2 s . c o m*/ if (!actionId.equals(ActionKeys.ACCESS) && !actionId.equals(ActionKeys.ACCESS_IN_CONTROL_PANEL) && !actionId.equals(ActionKeys.ADD_TO_PAGE) && !actionId.equals(ActionKeys.ASSIGN_MEMBERS) && !actionId.equals(ActionKeys.CONFIGURATION) && !actionId.equals(ActionKeys.CUSTOMIZE) && !actionId.equals(ActionKeys.DELETE) && !actionId.equals(ActionKeys.VIEW) && group.hasLocalOrRemoteStagingGroup() && (Validator.isNull(portletId) || group.isStagedPortlet(portletId))) { return false; } else { return null; } }
From source file:com.liferay.password.policies.admin.web.internal.display.context.PasswordPolicyDisplayContext.java
License:Open Source License
public boolean hasAssignMembersPermission() { long passwordPolicyId = ParamUtil.getLong(_request, "passwordPolicyId"); PasswordPolicy passwordPolicy = PasswordPolicyLocalServiceUtil.fetchPasswordPolicy(passwordPolicyId); if (passwordPolicy == null) { return false; }//from ww w . ja v a2s. c o m ThemeDisplay themeDisplay = (ThemeDisplay) _request.getAttribute(WebKeys.THEME_DISPLAY); return PasswordPolicyPermissionUtil.contains(themeDisplay.getPermissionChecker(), passwordPolicy.getPasswordPolicyId(), ActionKeys.ASSIGN_MEMBERS); }
From source file:com.liferay.password.policies.admin.web.internal.portlet.configuration.icon.AssignMembersPortletConfigurationIcon.java
License:Open Source License
@Override public boolean isShow(PortletRequest portletRequest) { try {/* w ww .j a v a 2 s . c o m*/ ThemeDisplay themeDisplay = (ThemeDisplay) portletRequest.getAttribute(WebKeys.THEME_DISPLAY); if (PasswordPolicyPermissionUtil.contains(themeDisplay.getPermissionChecker(), _getPasswordPolicyId(portletRequest), ActionKeys.ASSIGN_MEMBERS)) { return true; } } catch (Exception e) { } return false; }
From source file:com.liferay.site.memberships.web.internal.portlet.SiteMembershipsControlPanelEntry.java
License:Open Source License
@Override protected boolean hasPermissionImplicitlyGranted(PermissionChecker permissionChecker, Group group, Portlet portlet) throws Exception { if (GroupPermissionUtil.contains(permissionChecker, group, ActionKeys.ASSIGN_MEMBERS)) { return true; }// w w w .j ava 2 s .c om return super.hasPermissionImplicitlyGranted(permissionChecker, group, portlet); }
From source file:com.liferay.user.groups.admin.web.internal.portlet.configuration.icon.AssignMembersPortletConfigurationIcon.java
License:Open Source License
@Override public boolean isShow(PortletRequest portletRequest) { try {//from ww w. j a va 2 s.co m ThemeDisplay themeDisplay = (ThemeDisplay) portletRequest.getAttribute(WebKeys.THEME_DISPLAY); UserGroup userGroup = ActionUtil.getUserGroup(portletRequest); return UserGroupPermissionUtil.contains(themeDisplay.getPermissionChecker(), userGroup.getUserGroupId(), ActionKeys.ASSIGN_MEMBERS); } catch (Exception e) { } return false; }
From source file:eu.gerhards.liferay.services.angular.service.impl.AngularGroupServiceImpl.java
License:Open Source License
public long[] checkGroups(long userId, long[] groupIds) throws PortalException { long[] oldGroupIds = null; PermissionChecker permissionChecker = getPermissionChecker(); User user = null;/* w w w .j a v a2s . co m*/ if (userId != CompanyConstants.SYSTEM) { // Add back any mandatory groups or groups that the administrator // does not have the rights to remove and check that he has the // permission to add a new group user = userPersistence.findByPrimaryKey(userId); List<Group> oldGroups = GroupLocalServiceUtil.getUserGroups(userId); oldGroupIds = new long[oldGroups.size()]; for (int i = 0; i < oldGroups.size(); i++) { Group group = oldGroups.get(i); if (!ArrayUtil.contains(groupIds, group.getGroupId()) && (!GroupPermissionUtil.contains(permissionChecker, group, ActionKeys.ASSIGN_MEMBERS) || SiteMembershipPolicyUtil.isMembershipProtected(permissionChecker, user.getUserId(), group.getGroupId()) || SiteMembershipPolicyUtil.isMembershipRequired(userId, group.getGroupId()))) { groupIds = ArrayUtil.append(groupIds, group.getGroupId()); } oldGroupIds[i] = group.getGroupId(); } } // Check that the administrator has the permission to add a new group // and that the group membership is allowed for (long groupId : groupIds) { if ((oldGroupIds != null) && ArrayUtil.contains(oldGroupIds, groupId)) { continue; } Group group = GroupLocalServiceUtil.getGroup(groupId); GroupPermissionUtil.check(permissionChecker, group, ActionKeys.ASSIGN_MEMBERS); } return groupIds; }
From source file:eu.gerhards.liferay.services.angular.service.impl.AngularOrganizationServiceImpl.java
License:Open Source License
public long[] checkOrganizations(long userId, long[] organizationIds) throws PortalException { long[] oldOrganizationIds = null; PermissionChecker permissionChecker = getPermissionChecker(); if (userId != CompanyConstants.SYSTEM) { // Add back any mandatory organizations or organizations that the // administrator does not have the rights to remove and check that // he has the permission to add a new organization List<Organization> oldOrganizations = OrganizationLocalServiceUtil.getUserOrganizations(userId); oldOrganizationIds = new long[oldOrganizations.size()]; for (int i = 0; i < oldOrganizations.size(); i++) { Organization organization = oldOrganizations.get(i); if (!ArrayUtil.contains(organizationIds, organization.getOrganizationId()) && (!OrganizationPermissionUtil.contains(permissionChecker, organization, ActionKeys.ASSIGN_MEMBERS) || OrganizationMembershipPolicyUtil.isMembershipProtected(permissionChecker, userId, organization.getOrganizationId()) || OrganizationMembershipPolicyUtil.isMembershipRequired(userId, organization.getOrganizationId()))) { organizationIds = ArrayUtil.append(organizationIds, organization.getOrganizationId()); }//from ww w . ja v a 2 s .c om oldOrganizationIds[i] = organization.getOrganizationId(); } } // Check that the administrator has the permission to add a new // organization and that the organization membership is allowed for (long organizationId : organizationIds) { if ((oldOrganizationIds != null) && ArrayUtil.contains(oldOrganizationIds, organizationId)) { continue; } Organization organization = OrganizationLocalServiceUtil.getOrganization(organizationId); OrganizationPermissionUtil.check(permissionChecker, organization, ActionKeys.ASSIGN_MEMBERS); } return organizationIds; }
From source file:eu.gerhards.liferay.services.angular.service.impl.AngularRoleServiceImpl.java
License:Open Source License
public long[] checkRoles(long userId, long[] roleIds) throws PortalException { long[] oldRoleIds = null; PermissionChecker permissionChecker = getPermissionChecker(); if (userId != CompanyConstants.SYSTEM) { // Add back any mandatory roles or roles that the administrator does // not have the rights to remove and check that he has the // permission to add a new role List<Role> oldRoles = RoleLocalServiceUtil.getUserRoles(userId); oldRoleIds = new long[oldRoles.size()]; for (int i = 0; i < oldRoles.size(); i++) { Role role = oldRoles.get(i); if (!ArrayUtil.contains(roleIds, role.getRoleId()) && (!RolePermissionUtil .contains(permissionChecker, role.getRoleId(), ActionKeys.ASSIGN_MEMBERS) || RoleMembershipPolicyUtil.isRoleRequired(userId, role.getRoleId()))) { roleIds = ArrayUtil.append(roleIds, role.getRoleId()); }/*w w w . j a va 2s .com*/ oldRoleIds[i] = role.getRoleId(); } } // Check that the administrator has the permission to add a new role and // that the role membership is allowed for (long roleId : roleIds) { if ((oldRoleIds != null) && ArrayUtil.contains(oldRoleIds, roleId)) { continue; } RolePermissionUtil.check(permissionChecker, roleId, ActionKeys.ASSIGN_MEMBERS); } if (userId != CompanyConstants.SYSTEM) { return UsersAdminUtil.addRequiredRoles(userId, roleIds); } return roleIds; }
From source file:eu.gerhards.liferay.services.angular.service.impl.AngularTeamServiceImpl.java
License:Open Source License
@Override public void assignUserToTeam(long userId, long teamId) throws PortalException { _log.info("Assigning user to team ..."); _log.debug(" ... security check ..."); this.checkPersonalPermission(AngularActionKeys.ASSIGN_USER_TO_TEAM); TeamPermissionUtil.check(getPermissionChecker(), teamId, ActionKeys.ASSIGN_MEMBERS); _log.debug(" ... processing ..."); TeamLocalServiceUtil.addUserTeam(userId, teamId); }
From source file:eu.gerhards.liferay.services.angular.service.impl.AngularTeamServiceImpl.java
License:Open Source License
@Override public void assignUserGroupTeam(long userGroupId, long teamId) throws PortalException { _log.info("Assigning user group with id " + userGroupId + " to team with id " + teamId); this.checkPersonalPermission(AngularActionKeys.ASSIGN_USER_TO_TEAM); GroupPermissionUtil.check(getPermissionChecker(), teamId, ActionKeys.ASSIGN_MEMBERS); _log.debug(" ... processing ..."); TeamLocalServiceUtil.addUserGroupTeam(userGroupId, teamId); }