Codota Logo
AuthorizationManager.newPermissionCheck
Code IndexAdd Codota to your IDE (free)

How to use
newPermissionCheck
method
in
org.camunda.bpm.engine.impl.persistence.entity.AuthorizationManager

Best Java code snippets using org.camunda.bpm.engine.impl.persistence.entity.AuthorizationManager.newPermissionCheck (Showing top 20 results out of 315)

  • Add the Codota plugin to your IDE and get smart completions
private void myMethod () {
ArrayList a =
  • Codota Iconnew ArrayList<String>()
  • Codota Iconnew ArrayList()
  • Codota Iconnew ArrayList<Object>()
  • Smart code suggestions by Codota
}
origin: camunda/camunda-bpm-platform

public boolean isAuthorized(String userId, List<String> groupIds, Permission permission, Resource resource, String resourceId) {
 PermissionCheck permCheck = newPermissionCheck();
 permCheck.setPermission(permission);
 permCheck.setResource(resource);
 permCheck.setResourceId(resourceId);
 ArrayList<PermissionCheck> permissionChecks = new ArrayList<PermissionCheck>();
 permissionChecks.add(permCheck);
 return isAuthorized(userId, groupIds, permissionChecks);
}
origin: camunda/camunda-bpm-platform

public boolean isAuthorized(String userId, List<String> groupIds, Permission permission, Resource resource, String resourceId) {
 PermissionCheck permCheck = newPermissionCheck();
 permCheck.setPermission(permission);
 permCheck.setResource(resource);
 permCheck.setResourceId(resourceId);
 ArrayList<PermissionCheck> permissionChecks = new ArrayList<PermissionCheck>();
 permissionChecks.add(permCheck);
 return isAuthorized(userId, groupIds, permissionChecks);
}
origin: camunda/camunda-bpm-platform

protected void addPermissionCheck(ListQueryParameterObject query, Resource resource, String queryParam, Permission permission) {
 CommandContext commandContext = getCommandContext();
 if (isAuthorizationEnabled() && getCurrentAuthentication() != null && commandContext.isAuthorizationCheckEnabled()) {
  PermissionCheck permCheck = newPermissionCheck();
  permCheck.setResource(resource);
  permCheck.setResourceIdQueryParam(queryParam);
  permCheck.setPermission(permission);
  query.getAuthCheck().addAtomicPermissionCheck(permCheck);
 }
}
origin: camunda/camunda-bpm-platform

PermissionCheck firstProcessInstancePermissionCheck = newPermissionCheck();
firstProcessInstancePermissionCheck.setResource(PROCESS_INSTANCE);
firstProcessInstancePermissionCheck.setPermission(READ);
firstProcessInstancePermissionCheck.setResourceIdQueryParam("E.PROC_INST_ID_");
PermissionCheck secondProcessInstancePermissionCheck = newPermissionCheck();
secondProcessInstancePermissionCheck.setResource(PROCESS_DEFINITION);
secondProcessInstancePermissionCheck.setPermission(READ_INSTANCE);
 PermissionCheck firstJobPermissionCheck = newPermissionCheck();
 firstJobPermissionCheck.setResource(PROCESS_INSTANCE);
 firstJobPermissionCheck.setPermission(READ);
 firstJobPermissionCheck.setResourceIdQueryParam("JOB.PROCESS_INSTANCE_ID_");
 PermissionCheck secondJobPermissionCheck = newPermissionCheck();
 secondJobPermissionCheck.setResource(PROCESS_DEFINITION);
 secondJobPermissionCheck.setPermission(READ_INSTANCE);
 PermissionCheck firstIncidentPermissionCheck = newPermissionCheck();
 firstIncidentPermissionCheck.setResource(PROCESS_INSTANCE);
 firstIncidentPermissionCheck.setPermission(READ);
 firstIncidentPermissionCheck.setResourceIdQueryParam("I.PROC_INST_ID_");
 PermissionCheck secondIncidentPermissionCheck = newPermissionCheck();
 secondIncidentPermissionCheck.setResource(PROCESS_DEFINITION);
 secondIncidentPermissionCheck.setPermission(READ_INSTANCE);
origin: camunda/camunda-bpm-platform

PermissionCheck firstProcessInstancePermissionCheck = newPermissionCheck();
firstProcessInstancePermissionCheck.setResource(PROCESS_INSTANCE);
firstProcessInstancePermissionCheck.setPermission(READ);
firstProcessInstancePermissionCheck.setResourceIdQueryParam("EXECUTION.PROC_INST_ID_");
PermissionCheck secondProcessInstancePermissionCheck = newPermissionCheck();
secondProcessInstancePermissionCheck.setResource(PROCESS_DEFINITION);
secondProcessInstancePermissionCheck.setPermission(READ_INSTANCE);
 PermissionCheck firstJobPermissionCheck = newPermissionCheck();
 firstJobPermissionCheck.setResource(PROCESS_INSTANCE);
 firstJobPermissionCheck.setPermission(READ);
 firstJobPermissionCheck.setResourceIdQueryParam("JOB.PROCESS_INSTANCE_ID_");
 PermissionCheck secondJobPermissionCheck = newPermissionCheck();
 secondJobPermissionCheck.setResource(PROCESS_DEFINITION);
 secondJobPermissionCheck.setPermission(READ_INSTANCE);
 PermissionCheck firstIncidentPermissionCheck = newPermissionCheck();
 firstIncidentPermissionCheck.setResource(PROCESS_INSTANCE);
 firstIncidentPermissionCheck.setPermission(READ);
 firstIncidentPermissionCheck.setResourceIdQueryParam("INC.PROC_INST_ID_");
 PermissionCheck secondIncidentPermissionCheck = newPermissionCheck();
 secondIncidentPermissionCheck.setResource(PROCESS_DEFINITION);
 secondIncidentPermissionCheck.setPermission(READ_INSTANCE);
origin: camunda/camunda-bpm-platform

PermissionCheck firstProcessInstancePermissionCheck = newPermissionCheck();
firstProcessInstancePermissionCheck.setResource(PROCESS_INSTANCE);
firstProcessInstancePermissionCheck.setPermission(READ);
firstProcessInstancePermissionCheck.setResourceIdQueryParam("E.PROC_INST_ID_");
PermissionCheck secondProcessInstancePermissionCheck = newPermissionCheck();
secondProcessInstancePermissionCheck.setResource(PROCESS_DEFINITION);
secondProcessInstancePermissionCheck.setPermission(READ_INSTANCE);
 PermissionCheck firstJobPermissionCheck = newPermissionCheck();
 firstJobPermissionCheck.setResource(PROCESS_INSTANCE);
 firstJobPermissionCheck.setPermission(READ);
 firstJobPermissionCheck.setResourceIdQueryParam("JOB.PROCESS_INSTANCE_ID_");
 PermissionCheck secondJobPermissionCheck = newPermissionCheck();
 secondJobPermissionCheck.setResource(PROCESS_DEFINITION);
 secondJobPermissionCheck.setPermission(READ_INSTANCE);
 PermissionCheck firstIncidentPermissionCheck = newPermissionCheck();
 firstIncidentPermissionCheck.setResource(PROCESS_INSTANCE);
 firstIncidentPermissionCheck.setPermission(READ);
 firstIncidentPermissionCheck.setResourceIdQueryParam("I.PROC_INST_ID_");
 PermissionCheck secondIncidentPermissionCheck = newPermissionCheck();
 secondIncidentPermissionCheck.setResource(PROCESS_DEFINITION);
 secondIncidentPermissionCheck.setPermission(READ_INSTANCE);
origin: camunda/camunda-bpm-platform

PermissionCheck firstProcessInstancePermissionCheck = newPermissionCheck();
firstProcessInstancePermissionCheck.setResource(PROCESS_INSTANCE);
firstProcessInstancePermissionCheck.setPermission(READ);
firstProcessInstancePermissionCheck.setResourceIdQueryParam("EXECUTION.PROC_INST_ID_");
PermissionCheck secondProcessInstancePermissionCheck = newPermissionCheck();
secondProcessInstancePermissionCheck.setResource(PROCESS_DEFINITION);
secondProcessInstancePermissionCheck.setPermission(READ_INSTANCE);
 PermissionCheck firstJobPermissionCheck = newPermissionCheck();
 firstJobPermissionCheck.setResource(PROCESS_INSTANCE);
 firstJobPermissionCheck.setPermission(READ);
 firstJobPermissionCheck.setResourceIdQueryParam("JOB.PROCESS_INSTANCE_ID_");
 PermissionCheck secondJobPermissionCheck = newPermissionCheck();
 secondJobPermissionCheck.setResource(PROCESS_DEFINITION);
 secondJobPermissionCheck.setPermission(READ_INSTANCE);
 PermissionCheck firstIncidentPermissionCheck = newPermissionCheck();
 firstIncidentPermissionCheck.setResource(PROCESS_INSTANCE);
 firstIncidentPermissionCheck.setPermission(READ);
 firstIncidentPermissionCheck.setResourceIdQueryParam("INC.PROC_INST_ID_");
 PermissionCheck secondIncidentPermissionCheck = newPermissionCheck();
 secondIncidentPermissionCheck.setResource(PROCESS_DEFINITION);
 secondIncidentPermissionCheck.setPermission(READ_INSTANCE);
origin: camunda/camunda-bpm-platform

public void checkReadJob(JobEntity job) {
 if (job.getProcessDefinitionKey() == null) {
  // "standalone" job: nothing to do!
  return;
 }
 // necessary permissions:
 // - READ on PROCESS_INSTANCE
 PermissionCheck firstCheck = getAuthorizationManager().newPermissionCheck();
 firstCheck.setPermission(READ);
 firstCheck.setResource(PROCESS_INSTANCE);
 firstCheck.setResourceId(job.getProcessInstanceId());
 // ... OR ...
 // - READ_INSTANCE on PROCESS_DEFINITION
 PermissionCheck secondCheck = getAuthorizationManager().newPermissionCheck();
 secondCheck.setPermission(READ_INSTANCE);
 secondCheck.setResource(PROCESS_DEFINITION);
 secondCheck.setResourceId(job.getProcessDefinitionKey());
 secondCheck.setAuthorizationNotFoundReturnValue(0l);
 getAuthorizationManager().checkAuthorization(firstCheck, secondCheck);
}
origin: camunda/camunda-bpm-platform

public void checkUpdateJob(JobEntity job) {
 if (job.getProcessDefinitionKey() == null) {
  // "standalone" job: nothing to do!
  return;
 }
 // necessary permissions:
 // - UPDATE on PROCESS_INSTANCE
 PermissionCheck firstCheck = getAuthorizationManager().newPermissionCheck();
 firstCheck.setPermission(UPDATE);
 firstCheck.setResource(PROCESS_INSTANCE);
 firstCheck.setResourceId(job.getProcessInstanceId());
 // ... OR ...
 // - UPDATE_INSTANCE on PROCESS_DEFINITION
 PermissionCheck secondCheck = getAuthorizationManager().newPermissionCheck();
 secondCheck.setPermission(UPDATE_INSTANCE);
 secondCheck.setResource(PROCESS_DEFINITION);
 secondCheck.setResourceId(job.getProcessDefinitionKey());
 secondCheck.setAuthorizationNotFoundReturnValue(0l);
 getAuthorizationManager().checkAuthorization(firstCheck, secondCheck);
}
origin: camunda/camunda-bpm-platform

public void checkUpdateJob(JobEntity job) {
 if (job.getProcessDefinitionKey() == null) {
  // "standalone" job: nothing to do!
  return;
 }
 // necessary permissions:
 // - UPDATE on PROCESS_INSTANCE
 PermissionCheck firstCheck = getAuthorizationManager().newPermissionCheck();
 firstCheck.setPermission(UPDATE);
 firstCheck.setResource(PROCESS_INSTANCE);
 firstCheck.setResourceId(job.getProcessInstanceId());
 // ... OR ...
 // - UPDATE_INSTANCE on PROCESS_DEFINITION
 PermissionCheck secondCheck = getAuthorizationManager().newPermissionCheck();
 secondCheck.setPermission(UPDATE_INSTANCE);
 secondCheck.setResource(PROCESS_DEFINITION);
 secondCheck.setResourceId(job.getProcessDefinitionKey());
 secondCheck.setAuthorizationNotFoundReturnValue(0l);
 getAuthorizationManager().checkAuthorization(firstCheck, secondCheck);
}
origin: camunda/camunda-bpm-platform

public void checkReadJob(JobEntity job) {
 if (job.getProcessDefinitionKey() == null) {
  // "standalone" job: nothing to do!
  return;
 }
 // necessary permissions:
 // - READ on PROCESS_INSTANCE
 PermissionCheck firstCheck = getAuthorizationManager().newPermissionCheck();
 firstCheck.setPermission(READ);
 firstCheck.setResource(PROCESS_INSTANCE);
 firstCheck.setResourceId(job.getProcessInstanceId());
 // ... OR ...
 // - READ_INSTANCE on PROCESS_DEFINITION
 PermissionCheck secondCheck = getAuthorizationManager().newPermissionCheck();
 secondCheck.setPermission(READ_INSTANCE);
 secondCheck.setResource(PROCESS_DEFINITION);
 secondCheck.setResourceId(job.getProcessDefinitionKey());
 secondCheck.setAuthorizationNotFoundReturnValue(0l);
 getAuthorizationManager().checkAuthorization(firstCheck, secondCheck);
}
origin: camunda/camunda-bpm-platform

protected void addPermissionCheck(ListQueryParameterObject query, Resource resource, String queryParam, Permission permission) {
 CommandContext commandContext = getCommandContext();
 if (isAuthorizationEnabled() && getCurrentAuthentication() != null && commandContext.isAuthorizationCheckEnabled()) {
  PermissionCheck permCheck = newPermissionCheck();
  permCheck.setResource(resource);
  permCheck.setResourceIdQueryParam(queryParam);
  permCheck.setPermission(permission);
  query.getAuthCheck().addAtomicPermissionCheck(permCheck);
 }
}
origin: camunda/camunda-bpm-platform

ProcessDefinitionEntity processDefinition = execution.getProcessDefinition();
PermissionCheck readPermissionCheck = getAuthorizationManager().newPermissionCheck();
readPermissionCheck.setPermission(READ);
readPermissionCheck.setResource(TASK);
readPermissionCheck.setResourceId(taskId);
PermissionCheck readTaskPermissionCheck = getAuthorizationManager().newPermissionCheck();
readTaskPermissionCheck.setPermission(READ_TASK);
readTaskPermissionCheck.setResource(PROCESS_DEFINITION);
origin: camunda/camunda-bpm-platform

ProcessDefinitionEntity processDefinition = execution.getProcessDefinition();
PermissionCheck readPermissionCheck = getAuthorizationManager().newPermissionCheck();
readPermissionCheck.setPermission(READ);
readPermissionCheck.setResource(TASK);
readPermissionCheck.setResourceId(taskId);
PermissionCheck readTaskPermissionCheck = getAuthorizationManager().newPermissionCheck();
readTaskPermissionCheck.setPermission(READ_TASK);
readTaskPermissionCheck.setResource(PROCESS_DEFINITION);
origin: camunda/camunda-bpm-platform

public void configureProcessDefinitionQuery(ProcessDefinitionQueryImpl query) {
 configureQuery(query, PROCESS_DEFINITION, "RES.KEY_");
 if (query.isStartablePermissionCheck()) {
  AuthorizationCheck authorizationCheck = query.getAuthCheck();
  if (!authorizationCheck.isRevokeAuthorizationCheckEnabled()) {
   PermissionCheck permCheck = newPermissionCheck();
   permCheck.setResource(PROCESS_DEFINITION);
   permCheck.setResourceIdQueryParam("RES.KEY_");
   permCheck.setPermission(Permissions.CREATE_INSTANCE);
   query.addProcessDefinitionCreatePermissionCheck(permCheck);
  } else {
   CompositePermissionCheck permissionCheck = new PermissionCheckBuilder()
     .conjunctive()
     .atomicCheck(PROCESS_DEFINITION, "RES.KEY_", READ)
     .atomicCheck(PROCESS_DEFINITION, "RES.KEY_", Permissions.CREATE_INSTANCE)
     .build();
   addPermissionCheck(authorizationCheck, permissionCheck);
  }
 }
}
origin: camunda/camunda-bpm-platform

public void configureProcessDefinitionQuery(ProcessDefinitionQueryImpl query) {
 configureQuery(query, PROCESS_DEFINITION, "RES.KEY_");
 if (query.isStartablePermissionCheck()) {
  AuthorizationCheck authorizationCheck = query.getAuthCheck();
  if (!authorizationCheck.isRevokeAuthorizationCheckEnabled()) {
   PermissionCheck permCheck = newPermissionCheck();
   permCheck.setResource(PROCESS_DEFINITION);
   permCheck.setResourceIdQueryParam("RES.KEY_");
   permCheck.setPermission(Permissions.CREATE_INSTANCE);
   query.addProcessDefinitionCreatePermissionCheck(permCheck);
  } else {
   CompositePermissionCheck permissionCheck = new PermissionCheckBuilder()
     .conjunctive()
     .atomicCheck(PROCESS_DEFINITION, "RES.KEY_", READ)
     .atomicCheck(PROCESS_DEFINITION, "RES.KEY_", Permissions.CREATE_INSTANCE)
     .build();
   addPermissionCheck(authorizationCheck, permissionCheck);
  }
 }
}
origin: org.camunda.bpm/camunda-engine

public boolean isAuthorized(String userId, List<String> groupIds, Permission permission, Resource resource, String resourceId) {
 PermissionCheck permCheck = newPermissionCheck();
 permCheck.setPermission(permission);
 permCheck.setResource(resource);
 permCheck.setResourceId(resourceId);
 ArrayList<PermissionCheck> permissionChecks = new ArrayList<PermissionCheck>();
 permissionChecks.add(permCheck);
 return isAuthorized(userId, groupIds, permissionChecks);
}
origin: org.camunda.bpm/camunda-engine

protected void addPermissionCheck(ListQueryParameterObject query, Resource resource, String queryParam, Permission permission) {
 CommandContext commandContext = getCommandContext();
 if (isAuthorizationEnabled() && getCurrentAuthentication() != null && commandContext.isAuthorizationCheckEnabled()) {
  PermissionCheck permCheck = newPermissionCheck();
  permCheck.setResource(resource);
  permCheck.setResourceIdQueryParam(queryParam);
  permCheck.setPermission(permission);
  query.getAuthCheck().addAtomicPermissionCheck(permCheck);
 }
}
origin: org.camunda.bpm/camunda-engine

public void checkReadJob(JobEntity job) {
 if (job.getProcessDefinitionKey() == null) {
  // "standalone" job: nothing to do!
  return;
 }
 // necessary permissions:
 // - READ on PROCESS_INSTANCE
 PermissionCheck firstCheck = getAuthorizationManager().newPermissionCheck();
 firstCheck.setPermission(READ);
 firstCheck.setResource(PROCESS_INSTANCE);
 firstCheck.setResourceId(job.getProcessInstanceId());
 // ... OR ...
 // - READ_INSTANCE on PROCESS_DEFINITION
 PermissionCheck secondCheck = getAuthorizationManager().newPermissionCheck();
 secondCheck.setPermission(READ_INSTANCE);
 secondCheck.setResource(PROCESS_DEFINITION);
 secondCheck.setResourceId(job.getProcessDefinitionKey());
 secondCheck.setAuthorizationNotFoundReturnValue(0l);
 getAuthorizationManager().checkAuthorization(firstCheck, secondCheck);
}
origin: org.camunda.bpm/camunda-engine

public void configureProcessDefinitionQuery(ProcessDefinitionQueryImpl query) {
 configureQuery(query, PROCESS_DEFINITION, "RES.KEY_");
 if (query.isStartablePermissionCheck()) {
  AuthorizationCheck authorizationCheck = query.getAuthCheck();
  if (!authorizationCheck.isRevokeAuthorizationCheckEnabled()) {
   PermissionCheck permCheck = newPermissionCheck();
   permCheck.setResource(PROCESS_DEFINITION);
   permCheck.setResourceIdQueryParam("RES.KEY_");
   permCheck.setPermission(Permissions.CREATE_INSTANCE);
   query.addProcessDefinitionCreatePermissionCheck(permCheck);
  } else {
   CompositePermissionCheck permissionCheck = new PermissionCheckBuilder()
     .conjunctive()
     .atomicCheck(PROCESS_DEFINITION, "RES.KEY_", READ)
     .atomicCheck(PROCESS_DEFINITION, "RES.KEY_", Permissions.CREATE_INSTANCE)
     .build();
   addPermissionCheck(authorizationCheck, permissionCheck);
  }
 }
}
org.camunda.bpm.engine.impl.persistence.entityAuthorizationManagernewPermissionCheck

Popular methods of AuthorizationManager

  • configureQuery
  • filterAuthenticatedGroupIds
  • isAuthorized
  • addPermissionCheck
  • checkAuthorization
  • checkCamundaAdmin
    Checks if the current authentication contains the group Groups#CAMUNDA_ADMIN. The check is ignored i
  • configureActivityStatisticsQuery
  • configureBatchQuery
  • configureBatchStatisticsQuery
  • configureConditionalEventSubscriptionQuery
  • configureDecisionDefinitionQuery
  • configureDecisionRequirementsDefinitionQuery
  • configureDecisionDefinitionQuery,
  • configureDecisionRequirementsDefinitionQuery,
  • configureDeploymentQuery,
  • configureDeploymentStatisticsQuery,
  • configureEventSubscriptionQuery,
  • configureExecutionQuery,
  • configureExternalTaskFetch,
  • configureExternalTaskQuery,
  • configureHistoricActivityInstanceQuery,
  • configureHistoricBatchQuery

Popular in Java

  • Start an intent from android
  • scheduleAtFixedRate (ScheduledExecutorService)
  • scheduleAtFixedRate (Timer)
    Schedules the specified task for repeated fixed-rate execution, beginning after the specified delay.
  • setRequestProperty (URLConnection)
    Sets the general request property. If a property with the key already exists, overwrite its value wi
  • FlowLayout (java.awt)
    A flow layout arranges components in a left-to-right flow, much like lines of text in a paragraph. F
  • MessageFormat (java.text)
    MessageFormat provides a means to produce concatenated messages in language-neutral way. Use this to
  • Collection (java.util)
    Collection is the root of the collection hierarchy. It defines operations on data collections and t
  • UUID (java.util)
    UUID is an immutable representation of a 128-bit universally unique identifier (UUID). There are mul
  • JarFile (java.util.jar)
    JarFile is used to read jar entries and their associated data from jar files.
  • DataSource (javax.sql)
    A factory for connections to the physical data source that this DataSource object represents. An alt
Codota Logo
  • Products

    Search for Java codeSearch for JavaScript codeEnterprise
  • IDE Plugins

    IntelliJ IDEAWebStormAndroid StudioEclipseVisual Studio CodePyCharmSublime TextPhpStormVimAtomGoLandRubyMineEmacsJupyter
  • Company

    About UsContact UsCareers
  • Resources

    FAQBlogCodota Academy Plugin user guide Terms of usePrivacy policyJava Code IndexJavascript Code Index
Get Codota for your IDE now