@Override public void configureQuery(AbstractQuery query, Resource resource) { configureQuery(query, resource, "RES.ID_"); }
public void configureExecutionQuery(AbstractQuery query) { configureQuery(query); addPermissionCheck(query, PROCESS_INSTANCE, "RES.PROC_INST_ID_", READ); addPermissionCheck(query, PROCESS_DEFINITION, "P.KEY_", READ_INSTANCE); }
public void configureEventSubscriptionQuery(EventSubscriptionQueryImpl query) { configureQuery(query); addPermissionCheck(query, PROCESS_INSTANCE, "RES.PROC_INST_ID_", READ); addPermissionCheck(query, PROCESS_DEFINITION, "PROCDEF.KEY_", READ_INSTANCE); }
public void configureExternalTaskQuery(ExternalTaskQueryImpl query) { configureQuery(query); addPermissionCheck(query, PROCESS_INSTANCE, "RES.PROC_INST_ID_", READ); addPermissionCheck(query, PROCESS_DEFINITION, "RES.PROC_DEF_KEY_", READ_INSTANCE); }
public void configureExecutionQuery(AbstractQuery query) { configureQuery(query); addPermissionCheck(query, PROCESS_INSTANCE, "RES.PROC_INST_ID_", READ); addPermissionCheck(query, PROCESS_DEFINITION, "P.KEY_", READ_INSTANCE); }
public void configureIncidentQuery(IncidentQueryImpl query) { configureQuery(query); addPermissionCheck(query, PROCESS_INSTANCE, "RES.PROC_INST_ID_", READ); addPermissionCheck(query, PROCESS_DEFINITION, "PROCDEF.KEY_", READ_INSTANCE); }
public void configureJobQuery(JobQueryImpl query) { configureQuery(query); addPermissionCheck(query, PROCESS_INSTANCE, "RES.PROCESS_INSTANCE_ID_", READ); addPermissionCheck(query, PROCESS_DEFINITION, "RES.PROCESS_DEF_KEY_", READ_INSTANCE); }
@Override protected void configureQuery(@SuppressWarnings("rawtypes") AbstractQuery query, Resource resource) { Context.getCommandContext() .getAuthorizationManager() .configureQuery(query, resource); }
@Override protected void configureQuery(@SuppressWarnings("rawtypes") AbstractQuery query, Resource resource) { Context.getCommandContext() .getAuthorizationManager() .configureQuery(query, resource); }
public void configureJobQuery(JobQueryImpl query) { configureQuery(query); addPermissionCheck(query, PROCESS_INSTANCE, "RES.PROCESS_INSTANCE_ID_", READ); addPermissionCheck(query, PROCESS_DEFINITION, "RES.PROCESS_DEF_KEY_", READ_INSTANCE); }
public void configureEventSubscriptionQuery(EventSubscriptionQueryImpl query) { configureQuery(query); addPermissionCheck(query, PROCESS_INSTANCE, "RES.PROC_INST_ID_", READ); addPermissionCheck(query, PROCESS_DEFINITION, "PROCDEF.KEY_", READ_INSTANCE); }
public void configureIncidentQuery(IncidentQueryImpl query) { configureQuery(query); addPermissionCheck(query, PROCESS_INSTANCE, "RES.PROC_INST_ID_", READ); addPermissionCheck(query, PROCESS_DEFINITION, "PROCDEF.KEY_", READ_INSTANCE); }
public void configureExternalTaskQuery(ExternalTaskQueryImpl query) { configureQuery(query); addPermissionCheck(query, PROCESS_INSTANCE, "RES.PROC_INST_ID_", READ); addPermissionCheck(query, PROCESS_DEFINITION, "RES.PROC_DEF_KEY_", READ_INSTANCE); }
public List<Authorization> selectAuthorizationByQueryCriteria(AuthorizationQueryImpl authorizationQuery) { configureQuery(authorizationQuery, AUTHORIZATION); return getDbEntityManager().selectList("selectAuthorizationByQueryCriteria", authorizationQuery); }
@Test public void shouldUseCfgValue_never() { final ListQueryParameterObject query = new ListQueryParameterObject(); final AuthorizationCheck authCheck = query.getAuthCheck(); // given when(mockedConfiguration.getAuthorizationCheckRevokes()).thenReturn(ProcessEngineConfiguration.AUTHORIZATION_CHECK_REVOKE_NEVER); // if authorizationManager.configureQuery(query); // then assertEquals(false, authCheck.isRevokeAuthorizationCheckEnabled()); verify(mockedEntityManager, never()).selectBoolean(eq("selectRevokeAuthorization"), any()); verifyNoMoreInteractions(mockedEntityManager); }
public void configureQueryHistoricFinishedInstanceReport(ListQueryParameterObject query, Resource resource) { configureQuery(query); CompositePermissionCheck compositePermissionCheck = new PermissionCheckBuilder() .conjunctive() .atomicCheck(resource, "RES.KEY_", READ) .atomicCheck(resource, "RES.KEY_", READ_HISTORY) .build(); query.getAuthCheck().setPermissionChecks(compositePermissionCheck); }
@Test public void shouldUseCfgValue_always() { final ListQueryParameterObject query = new ListQueryParameterObject(); final AuthorizationCheck authCheck = query.getAuthCheck(); // given when(mockedConfiguration.getAuthorizationCheckRevokes()).thenReturn(ProcessEngineConfiguration.AUTHORIZATION_CHECK_REVOKE_ALWAYS); // if authorizationManager.configureQuery(query); // then assertEquals(true, authCheck.isRevokeAuthorizationCheckEnabled()); verifyNoMoreInteractions(mockedEntityManager); }
public void configureQueryHistoricFinishedInstanceReport(ListQueryParameterObject query, Resource resource) { configureQuery(query); CompositePermissionCheck compositePermissionCheck = new PermissionCheckBuilder() .conjunctive() .atomicCheck(resource, "RES.KEY_", READ) .atomicCheck(resource, "RES.KEY_", READ_HISTORY) .build(); query.getAuthCheck().setPermissionChecks(compositePermissionCheck); }
protected void configureVariableInstanceQuery(VariableInstanceQueryImpl query) { configureQuery(query); if(query.getAuthCheck().isAuthorizationCheckEnabled()) { CompositePermissionCheck permissionCheck = new PermissionCheckBuilder() .disjunctive() .atomicCheck(PROCESS_INSTANCE, "RES.PROC_INST_ID_", READ) .atomicCheck(PROCESS_DEFINITION, "PROCDEF.KEY_", READ_INSTANCE) .atomicCheck(TASK, "RES.TASK_ID_", READ) .build(); addPermissionCheck(query.getAuthCheck(), permissionCheck); } }
protected void configureVariableInstanceQuery(VariableInstanceQueryImpl query) { configureQuery(query); if(query.getAuthCheck().isAuthorizationCheckEnabled()) { CompositePermissionCheck permissionCheck = new PermissionCheckBuilder() .disjunctive() .atomicCheck(PROCESS_INSTANCE, "RES.PROC_INST_ID_", READ) .atomicCheck(PROCESS_DEFINITION, "PROCDEF.KEY_", READ_INSTANCE) .atomicCheck(TASK, "RES.TASK_ID_", READ) .build(); addPermissionCheck(query.getAuthCheck(), permissionCheck); } }