private boolean doValidationOfMandatoryAttributes( User user ) { return user == null || !user.isAuthorized( Authorities.F_IGNORE_TRACKER_REQUIRED_VALUE_VALIDATION.getAuthority() ); }
private boolean doValidationOfMandatoryAttributes( User user ) { return user == null || !user.isAuthorized( Authorities.F_IGNORE_TRACKER_REQUIRED_VALUE_VALIDATION.getAuthority() ); }
/** * Indicates whether the data set is locked for data entry based on the * expiry days. * * @param period the period to compare with. * @param now the date indicating now, uses current date if null. */ public boolean isLocked( User user, Period period, Date now ) { if ( user != null && user.isAuthorized( Authorities.F_EDIT_EXPIRED.getAuthority() ) ) { return false; } DateTime date = now != null ? new DateTime( now ) : new DateTime(); return expiryDays != DataSet.NO_EXPIRY && new DateTime( period.getEndDate() ).plusDays( expiryDays ).isBefore( date ); }
@Override public boolean hasAccessToManageFeedbackMessages( User user ) { user = (user == null ? currentUserService.getCurrentUser() : user); return configurationService.isUserInFeedbackRecipientUserGroup( user ) || user.isAuthorized( "ALL" ); }
@Override public void decideAccessEventQuery( EventQueryParams params ) { User user = currentUserService.getCurrentUser(); decideAccess( params ); boolean notAuthorized = user != null && !user.isAuthorized( AUTH_VIEW_EVENT_ANALYTICS ); throwExWhenTrue( notAuthorized, String.format( "User: %s is not allowed to view event analytics", user.getUsername() ) ); }
private List<ImportConflict> isAllowedToDelete( User user, org.hisp.dhis.trackedentity.TrackedEntityInstance tei ) { List<ImportConflict> importConflicts = new ArrayList<>(); Set<ProgramInstance> programInstances = tei.getProgramInstances().stream() .filter( pi -> !pi.isDeleted() ) .collect( Collectors.toSet() ); if ( !programInstances.isEmpty() && !user.isAuthorized( Authorities.F_TEI_CASCADE_DELETE.getAuthority() ) ) { importConflicts.add( new ImportConflict( tei.getUid(), "Tracked entity instance " + tei.getUid() + " cannot be deleted as it has associated enrollments and user does not have authority " + Authorities.F_TEI_CASCADE_DELETE.getAuthority() ) ); } List<String> errors = trackerAccessManager.canWrite( user, tei ); if ( !errors.isEmpty() ) { errors.forEach( error -> importConflicts.add( new ImportConflict( tei.getUid(), error ) ) ); } return importConflicts; }
private List<ImportConflict> isAllowedToDelete( User user, ProgramInstance pi ) { List<ImportConflict> importConflicts = new ArrayList<>(); Set<ProgramStageInstance> notDeletedProgramStageInstances = pi.getProgramStageInstances().stream() .filter( psi -> !psi.isDeleted() ) .collect( Collectors.toSet() ); if ( !notDeletedProgramStageInstances.isEmpty() && !user.isAuthorized( Authorities.F_ENROLLMENT_CASCADE_DELETE.getAuthority() ) ) { importConflicts.add( new ImportConflict( pi.getUid(), "Enrollment " + pi.getUid() + " cannot be deleted as it has associated events and user does not have authority: " + Authorities.F_ENROLLMENT_CASCADE_DELETE.getAuthority() ) ); } List<String> errors = trackerAccessManager.canWrite( user, pi ); if ( !errors.isEmpty() ) { errors.forEach( error -> importConflicts.add( new ImportConflict( pi.getUid(), error ) ) ); } return importConflicts; } }
public void markReplied( User sender, Message message ) { for ( UserMessage userMessage : userMessages ) { User user = userMessage.getUser(); if ( user != null && !user.equals( sender ) && (!message.isInternal() || (message.isInternal() && (user.isAuthorized( "F_MANAGE_TICKETS" ) || user.isAuthorized( "ALL" )))) ) { userMessage.setRead( false ); } } addMessage( message ); this.lastSender = sender; this.setLastMessage( new Date() ); }
@Override public boolean isLocked( User user, DataElement dataElement, Period period, OrganisationUnit organisationUnit, CategoryOptionCombo attributeOptionCombo, Date now ) { if ( user == null || !user.isAuthorized( Authorities.F_EDIT_EXPIRED.getAuthority() ) ) { now = now != null ? now : new Date(); boolean expired = dataElement.isExpired( period, now ); if ( expired && lockExceptionStore.getCount( dataElement, period, organisationUnit ) == 0L ) { return true; } } DataSet dataSet = dataElement.getApprovalDataSet(); if ( dataSet == null ) { return false; } return dataApprovalService.isApproved( dataSet.getWorkflow(), period, organisationUnit, attributeOptionCombo ); }
if ( importOptions.getUser() == null || !importOptions.getUser().isAuthorized( Authorities.F_EDIT_EXPIRED.getAuthority() ) )
if ( importOptions.getUser() == null || !importOptions.getUser().isAuthorized( Authorities.F_EDIT_EXPIRED.getAuthority() ) )