@Override public void removeSubmitters(Context context, Collection collection) throws SQLException, AuthorizeException { // Check authorisation - Must be an Admin to delete Submitters Group AuthorizeUtil.authorizeManageSubmittersGroup(context, collection); // just return if there is no administrative group. if (collection.getSubmitters() == null) { return; } // Remove the link to the collection table. collection.setSubmitters(null); }
if (collection.getSubmitters() != null) { list.add(collection.getSubmitters());
if (collection.getSubmitters() != null)
roleGroup = collection.getSubmitters(); if (roleGroup == null) roleGroup = collection.createSubmitters();
Group g = collection.getSubmitters(); collection.removeSubmitters(); collection.update(); Group g = collection.getSubmitters(); response.sendRedirect(response.encodeRedirectURL(request .getContextPath()
Group group = collection.getSubmitters();
@Override public Group createSubmitters(Context context, Collection collection) throws SQLException, AuthorizeException { // Check authorisation - Must be an Admin to create Submitters Group AuthorizeUtil.authorizeManageSubmittersGroup(context, collection); Group submitters = collection.getSubmitters(); if (submitters == null) { //turn off authorization so that Collection Admins can create Collection Submitters context.turnOffAuthorisationSystem(); submitters = groupService.create(context); context.restoreAuthSystemState(); groupService.setName(submitters, "COLLECTION_" + collection.getID() + "_SUBMIT"); groupService.update(context, submitters); } // register this as the submitter group collection.setSubmitters(submitters); authorizeService.addPolicy(context, collection, Constants.ADD, submitters); return submitters; }
g = collection.getSubmitters();
} else if (group.equals(collection.getSubmitters())) {
if (group.equals(collection.getSubmitters())) { if (AuthorizeConfiguration.canCollectionAdminManageSubmitters()) { return collection;
g = collection.getSubmitters();
Group submitters = thisCollection.getSubmitters();