/** * Attempt to match a given permission to what is defined in the UI. * @param id String of the form "Title/Permission" (Look in the UI) for a particular permission * @return a matched permission */ @CheckForNull public static Permission findPermission(String id) { final String resolvedId = findPermissionId(id); return resolvedId != null ? Permission.fromId(resolvedId) : null; }
public boolean showPermission(Permission p) { // These three are only used by Team Authorization if (p == Computer.READ){ return false; } if (p == Computer.CREATE){ return false; } if (p == View.READ){ return false; } return p.getEnabled() && p != Item.CREATE; }
@Initializer(after=InitMilestone.EXTENSIONS_AUGMENTED, before=InitMilestone.JOB_LOADED) // same time as Jenkins global config is loaded (e.g., AuthorizationStrategy) public static void assertPermissionId() { String thePermissionId = "hudson.model.Run.Replay"; // An AuthorizationStrategy may be loading a permission by name during Jenkins startup. Permission thePermission = Permission.fromId(thePermissionId); // Make sure it finds this addition, even though the PermissionGroup is in core. assertEquals(ReplayAction.REPLAY, thePermission); assertEquals(thePermissionId, thePermission.getId()); }
Map<String,Boolean> permissionsMap = new HashMap<String, Boolean>(); for (Permission permission : permissions) { permissionsMap.put(permission.getId(),permission.getEnabled());
public static void shareFileOrFolder(Drive service, File file) throws IOException { Permission newPermission = new Permission(); newPermission.setEmailAddress("xxxxx@gmail.com"); newPermission.setValue("xxxxx@gmail.com"); newPermission.setType("user"); newPermission.setRole("writer"); service.permissions().insert(file.getId(), newPermission).execute(); }
@Override public void start() throws Exception { // this permission designates a wrong parent group, which introduces a classloading problem // like HUDSON-4172. // // As a work around, force loading of this permission so that by the time we start loading ACLs, // we have this instance already registered, thereby avoiding a lookup. DescriptorImpl.CREATE_RELEASE.toString(); } }
private void initRolePerm(){ Permission deletePermission = new Permission(); deletePermission.setName("ABC"); deletePermission.setType("ABC"); Permission postPermission = new Permission(); postPermission.setName("XYZ"); postPermission.setType("XYZ"); Role adminRole = new Role(); adminRole.setRoleName("Admin"); postPermission.getRoleSet().add(adminRole); deletePermission.getRoleSet().add(adminRole); adminRole.getPermissionSet().add(postPermission); adminRole.getPermissionSet().add(deletePermission); roleDao.insert(adminRole); }
public Permission canExecute(){ Permission execute = new Permission(); set_Execute(execute); log("can execute"+execute); //it is going inside method set_Execute but it is always printing execute as false return execute; } private void set_Execute(Permission setExecute){ setExecute.setAllowed(true); }
insertPermission(service, fileId, "anyone", "reader"); System.out.println( file.getWebContentLink()); private static Permission insertPermission(Drive service, String fileId, String type, String role) { Permission newPermission = new Permission(); // newPermission.setValue(value); newPermission.setType(type); newPermission.setRole(role); try { return service.permissions().insert(fileId, newPermission).execute(); } catch (IOException e) { System.out.println("An error occurred: " + e); } return null; }
GrantPermissions(String username, List<Permission> permissions) { this.username = username; this.permissions = permissions; for (Permission p : permissions) { p.setEnabled(true); } } @Override
public void afterPropertiesSet() throws Exception { _logger.debug("setting test uses data"); User user = new User(); user.setLogin("dmitro"); user.setPassword("2424"); user.setStatus(UserStatus.ACTIVE); Set<Role> roles = new HashSet<Role>(); Role role = new Role(); role.setRoleName("ROLE_ADMIN"); Set<Permission> permissions = new HashSet<>(); Permission permission = new Permission(); permission.setPermissionName("PERM_SAVE_PRODUCT"); permissions.add(permission); role.setPermissions(permissions); roles.add(role); user.setRoles(roles); userRepository.save(user);
public boolean showPermission(Permission p) { // These three are only used by Team Authorization if (p == Computer.READ){ return false; } if (p == Computer.CREATE){ return false; } if (p == View.READ){ return false; } return p.getEnabled(); }
Permission newPermission = new Permission(); newPermission.setValue("...your regular username...@gmail.com"); newPermission.setType("user"); newPermission.setRole("reader"); service.permissions().insert(file.getId(), newPermission).execute();
AbstractProject.WORKSPACE.toString(); User.clear();
Permission perm = new Permission(); //set the permissions you want. setPermission(perm.getDecimalCode(), path);
/*package*/ void onConfigChange(@Nonnull EnvInjectPluginConfiguration config) { VIEW_INJECTED_VARS.setEnabled(config.isEnablePermissions()); }
@Override public Object decode(Class targetClass, Object fromDBObject, MappedField optionalExtraInfo) { if (fromDBObject == null) return null; return Permission.fromId((String) fromDBObject); }
public boolean showPermission(Permission p) { return p.getEnabled() && p!=Item.CREATE; }