public boolean check(final ApplicationUser user) { return permissionManager.hasPermission(Permissions.SYSTEM_ADMIN, user); } }, validator);
private boolean hasGroupManagementPermission(final ApplicationUser remoteUser) { return permissionManager.hasPermission(GlobalPermissionKey.ADMINISTER, remoteUser) || permissionManager.hasPermission(GlobalPermissionKey.SYSTEM_ADMIN, remoteUser); }
protected final boolean canAdministerOtherUser(ApplicationUser currentUser, ApplicationUser accessedUser) { return permissionManager.hasPermission(SYSTEM_ADMIN, currentUser) || permissionManager.hasPermission(GlobalPermissionKey.ADMINISTER, currentUser) && !permissionManager.hasPermission(SYSTEM_ADMIN, accessedUser); // regular admin cannot administer system admin }
@Override public boolean hasPermissionToEditIssueType(@Nullable final ApplicationUser user) { return globalPermissionManager.hasPermission(GlobalPermissionKey.ADMINISTER, user); } }
@Override public boolean hasGlobalPermission(GlobalPermissionKey globalPermissionKey) { return globalPermissionManager.hasPermission(globalPermissionKey, jiraAuthenticationContext.getLoggedInUser()); }
@Override public Optional<String> url(final ApplicationUser user) { return shouldDisplaySummary() && user != null && globalPermissionManager.hasPermission(GlobalPermissionKey.ADMINISTER, user) ? Optional.of(URL) : Optional.empty(); }
@Override public boolean hasPermissionToEdit(ApplicationUser remoteUser, Project owner) { //can't edit non-existent project! if (owner == null) { return false; } return globalPermissionManager.hasPermission(ADMINISTER, remoteUser) || permissionManager.hasPermission(ProjectPermissions.ADMINISTER_PROJECTS, owner, remoteUser); }
/** * Does the service user have permission so they can edit the default columns for userWithColumns? Any user can edit * their own columns, but only admins can edit other users colunns. * * @param serviceUser the user invoking the service request. * @param userWithColumns the user whose columns are to be edited. * @return true only if serviceUser is admin or the same user as userWithColumns. */ private boolean permissionForUsersColumns(ApplicationUser serviceUser, ApplicationUser userWithColumns) { return serviceUser != null && (serviceUser.equals(userWithColumns) || globalPermissionManager.hasPermission(ADMINISTER, serviceUser)); }
@Override public boolean isOnDemandSysAdmin(@Nonnull final ApplicationUser user) { return ( featureManager.isOnDemand() && permissionManager.hasPermission(GlobalPermissionKey.SYSTEM_ADMIN, user) ); }
@Override public boolean shouldDisplay(final Map<String, Object> context) { final ApplicationUser user = authenticationContext.getLoggedInUser(); return user != null && permissionManager.hasPermission(GlobalPermissionKey.ADMINISTER, user); } }
private boolean hasPermissions(final ApplicationUser user, final Scheme scheme) { return globalPermissionManager.hasPermission(GlobalPermissionKey.ADMINISTER, user) || notificationSchemeManager.getProjects(scheme) .stream() .anyMatch(project -> permissionManager.hasPermission(ProjectPermissions.ADMINISTER_PROJECTS, project, user)); }
public boolean isSystemAdministrator() { final ApplicationUser currentUser = getLoggedInUser(); return (currentUser != null) && getGlobalPermissionManager().hasPermission(GlobalPermissionKey.SYSTEM_ADMIN, currentUser); }
private boolean havePermission() { ApplicationUser user = context.getUser(); return !Users.isAnonymous(user) && globalPermissionManager.hasPermission(GlobalPermissionKey.ADMINISTER, user); } }
@Override public boolean hasSiteEditPermission() { final ApplicationUser loggedInUser = authenticationContext.getLoggedInUser(); return permissionManagerRef.get().hasPermission(GlobalPermissionKey.ADMINISTER, loggedInUser); }
@Override public boolean hasPermissionToEdit(ApplicationUser remoteUser, ApplicationUser owner) { //only logged in users can modify someone's avatar image! if (isAnonymous(remoteUser) || owner == null) { return false; } return globalPermissionManager.hasPermission(ADMINISTER, remoteUser) || remoteUser.getKey().equals(owner.getKey()); }
private boolean checkUserHasApplicationOrFalse(ApplicationUser user, BooleanSupplier delegate) { final GlobalPermissionManager globalPermissions = ComponentAccessor.getGlobalPermissionManager(); final ApplicationRoleManager roleManager = applicationRoleManager(); return (!roleManager.rolesEnabled() || !globalPermissions.hasPermission(GlobalPermissionKey.ADMINISTER, user) || roleManager.hasAnyRole(user)) && delegate.getAsBoolean(); }
private boolean checkUserIsAdmin(ApplicationUser applicationUser) { if (!permissionManager.hasPermission(GlobalPermissionKey.ADMINISTER, applicationUser)) { addErrorMessage(getText("admin.errors.no.admin.permission")); setLoginInvalid(true); return false; } return true; }
@Override public Map<String, Object> getContextMap(final Map<String, Object> context) { final ApplicationUser user = authContext.getUser(); return ImmutableMap.of("helpUrl", helpUrls.getUrl("recovery-mode").getUrl(), "isRecoveryAdmin", recoveryMode.isRecoveryUser(user), "isAdmin", permissionManager.hasPermission(GlobalPermissionKey.ADMINISTER, user)); } }
private Option<ErrorCollection> validateUser(final ApplicationUser user) { if (user == null) { return errorCollection(i18n.getText("rest.authentication.no.user.logged.in"), NOT_LOGGED_IN); } if (!globalPermissionManager.hasPermission(GlobalPermissionKey.ADMINISTER, user)) { return errorCollection(i18n.getText("rest.authorization.admin.required"), FORBIDDEN); } return none(); }
private <T> ServiceOutcome<T> validatePermission() { if (!permissionManager.hasPermission(GlobalPermissionKey.ADMINISTER, ctx.getLoggedInUser())) { return ServiceOutcomeImpl.error(ctx.getI18nHelper().getText("application.role.service.permission.denied"), ErrorCollection.Reason.FORBIDDEN); } else { return ServiceOutcomeImpl.ok(null); } }