boolean authorized = dso == null || AuthorizeManager.authorizeActionBoolean(context, dso, action, false); authorized = AuthorizeManager.isAdmin(context); if(!authorized) authorized = AuthorizeManager.isAdmin(context, dso);
Group[] itemGroups = AuthorizeManager.getAuthorizedGroups(context, collection, Constants.DEFAULT_ITEM_READ); Group[] bitstreamGroups = AuthorizeManager.getAuthorizedGroups(context, collection, Constants.DEFAULT_BITSTREAM_READ);
AuthorizeManager.removePoliciesActionFilter(context, collection, Constants.DEFAULT_ITEM_READ); AuthorizeManager.removePoliciesActionFilter(context, collection, Constants.DEFAULT_BITSTREAM_READ); AuthorizeManager.addPolicy(context, collection, Constants.DEFAULT_ITEM_READ, role); AuthorizeManager.addPolicy(context, collection, Constants.DEFAULT_BITSTREAM_READ, role);
private static Group getXMLWorkflowRole(Context context, int collectionID, String roleName, Collection collection, Group roleGroup) throws IOException, WorkflowConfigurationException, SQLException, AuthorizeException { Role role = WorkflowUtils.getCollectionRoles(collection).get(roleName); if(role.getScope() == Role.Scope.COLLECTION){ roleGroup = WorkflowUtils.getRoleGroup(context, collectionID, role); if(roleGroup == null){ AuthorizeManager.authorizeAction(context, collection, Constants.WRITE); roleGroup = Group.create(context); roleGroup.setName("COLLECTION_" + collection.getID() + "_WORKFLOW_ROLE_" + roleName); roleGroup.update(); AuthorizeManager.addPolicy(context, collection, Constants.ADD, roleGroup); WorkflowUtils.createCollectionWorkflowRole(context, collectionID, roleName, roleGroup); } } return roleGroup; }
return AuthorizeManager.isAdmin(context);
if(!AuthorizeManager.authorizeActionBoolean(context, item, Constants.ADD)) if (!AuthorizeManager.authorizeActionBoolean(context, bundle, Constants.ADD)) if (!AuthorizeManager.authorizeActionBoolean(context, bundle, Constants.WRITE))
List<ResourcePolicy> policies = AuthorizeManager.getPolicies(c, target); List<ResourcePolicy> policies = AuthorizeManager.getPolicies(c, collection); request.setAttribute("policies", policies); List<ResourcePolicy> policies = AuthorizeManager.getPolicies(c, community); request.setAttribute("policies", policies); List<ResourcePolicy> rps = AuthorizeManager.getPoliciesActionFilter(c, collection, Constants.READ); AuthorizeManager.removeAllPolicies(c, bs); AuthorizeManager.addPolicies(c, rps, bs); request.setAttribute("policies", AuthorizeManager.getPolicies( c, collection)); displayPage = "/dspace-admin/authorize-collection-edit.jsp"; List<ResourcePolicy> rps = AuthorizeManager.getPoliciesActionFilter(c, community, Constants.READ); AuthorizeManager.removeAllPolicies(c, bs); AuthorizeManager.addPolicies(c, rps, bs); request.setAttribute("policies", AuthorizeManager.getPolicies( c, community)); displayPage = "/dspace-admin/authorize-community-edit.jsp"; request.setAttribute("policies", AuthorizeManager.getPolicies(
boolean isAuthorized = AuthorizeManager.authorizeActionBoolean(context, bitstream, Constants.READ); if (item != null && item.isWithdrawn() && !AuthorizeManager.isAdmin(context)) for (ResourcePolicy rp : AuthorizeManager.getPoliciesActionFilter(context, bitstream, Constants.READ))
request.setAttribute("admin_button", AuthorizeManager.authorizeActionBoolean(context, item, Constants.ADMIN)); try if (AuthorizeManager.authorizeActionBoolean(context, item .getParentObject(), Constants.REMOVE)) AuthorizeManager.authorizeAction(context, item, Constants.ADD); request.setAttribute("create_bitstream_button", Boolean.TRUE); AuthorizeManager.authorizeAction(context, item, Constants.REMOVE); request.setAttribute("remove_bitstream_button", Boolean.TRUE);
List policySet = AuthorizeManager.getPolicies(context, logoContainer); AuthorizeManager.removeAllPolicies(context, logo); AuthorizeManager.addPolicies(context, policySet, logo);
&& AuthorizeManager.isAdmin(context)) AuthorizeManager.removePoliciesActionFilter(context, collection, Constants.DEFAULT_ITEM_READ); AuthorizeManager.removePoliciesActionFilter(context, collection, Constants.DEFAULT_BITSTREAM_READ);
if(AuthorizeManager.isAdmin(context, item)) AuthorizeManager.authorizeAction(context, item, Constants.WRITE);
void prepItemEditForm(Context c, HttpServletRequest request, Item item) throws SQLException List<ResourcePolicy> itemPolicies = AuthorizeManager.getPolicies(c, item); List<ResourcePolicy> myPolicies = AuthorizeManager.getPolicies(c, myBundle); myPolicies = AuthorizeManager.getPolicies(c, myBitstream); bitstreamPolicies.put(Integer.valueOf(myBitstream.getID()), myPolicies);
AuthorizeManager.authorizeAction(c, item, Constants.READ);
List<ResourcePolicy> anonReadPols = AuthorizeManager.getPoliciesActionFilter( context, collection, Constants.DEFAULT_ITEM_READ);
public void addOptions(Options options) throws SAXException, WingException, UIException, SQLException, IOException, AuthorizeException { /* Create skeleton menu structure to ensure consistent order between aspects, * even if they are never used */ List admin = options.addList("administrative"); //Check if a system administrator boolean isSystemAdmin = AuthorizeManager.isAdmin(this.context); // System Administrator options! if (isSystemAdmin) { admin.addItemXref(contextPath+ "/admin/xmlworkflowoverview", T_xmlworkflow_overview); } }
if (AuthorizeManager.authorizeActionBoolean(context, community, Constants.DELETE))
AuthorizeManager.authorizeAction(context, myCollection, Constants.COLLECTION_ADMIN); if (AuthorizeManager.authorizeActionBoolean(context, myItem, Constants.READ)) if (AuthorizeManager.authorizeActionBoolean(context, browseItems[i], Constants.READ))