/** * {@inheritDoc} */ public Set<String> getAdditionalRoles() { Set<String> roles = new HashSet<String>(); if (isAllowedAnon()) { roles.add(".anon"); } if (isAllowedAuth()) { roles.add(".auth"); } if (m_roleProvider != null) { roles.addAll(m_roleProvider.getAllAdditionalRoles()); } return roles; }
/** * {@inheritDoc} */ public String getRoleGroupName(String roleGroupId) { String name = null; if ("".equals(roleGroupId)) { name = rb.getString("generic.role.group"); }else if (m_roleProvider != null) { name = m_roleProvider.getDisplayName(roleGroupId); } // Never return null return (name == null) ? roleGroupId : name; }
/** * Gets the roles which shouldn't have members but a user belongs to. * @param userId * @return A set of role IDs. By convention these should all start with a dot ("."). */ Set<String> getEmptyRoles(String userId) { Set<String> roles = new HashSet<String>(); roles.add(ANON_ROLE); if ((userId != null) && (!userDirectoryService().getAnonymousUser().getId().equals(userId))) { // A dummy user is created to test role access instead of loading all of the roles and iterating over them. String roleId = decodeRoleFromDummyUser(userId); if (roleId != null){ roles.remove(ANON_ROLE); roles.add(roleId); } else { roles.add(AUTH_ROLE); // Get additional roles from provider if (m_roleProvider != null) { roles.addAll((m_roleProvider.getAdditionalRoles(userId))); } } } return roles; }
/** * {@inheritDoc} */ public String getRoleName(String roleId) { String role = null; if (".anon".equals(roleId)) { role = rb.getString("role.anon"); } else if (".auth".equals(roleId)) { role = rb.getString("role.auth"); } else if (m_roleProvider != null) { role = m_roleProvider.getDisplayName(roleId); } // Never return null return (role == null) ? roleId : role; }