@Override public ACL getACL() { // for now, don't maintain ACL per run, and do it at project level return getParent().getACL(); }
public ACL superGetACL() { return super.getACL(); }
@Override public ACL getACL() { // for now, don't maintain ACL per run, and do it at project level return getParent().getACL(); }
@Override public ACL getACL() { ACL acl = super.getACL(); for (JobProperty<?> property : properties) { if (property instanceof WorkflowJobProperty) { acl = ((WorkflowJobProperty) property).decorateACL(acl); } } return acl; }
public ACL getACL() { // for now, don't maintain ACL per run, and do it at project level return getParent().getACL(); }
public ACL getACL() { // for now, don't maintain ACL per run, and do it at project level return getParent().getACL(); }
public ACL getACL() { // for now, don't maintain ACL per run, and do it at project level return getParent().getACL(); }
public ACL getACL() { // for now, don't maintain ACL per run, and do it at project level return getParent().getACL(); }
public String getIconFileName() { if(tagName == null && !build.getParent().getACL().hasPermission(SCM.TAG)) { return null; } return "save.gif"; }
public String getIconFileName() { if(tagName == null && !build.getParent().getACL().hasPermission(SCM.TAG)) { return null; } return "save.gif"; }
@Override public ACL getACL() { initPython(); if (pexec.isImplemented(73)) { return (ACL) pexec.execPython("get_acl"); } else { return super.getACL(); } }
boolean b = job.getACL().hasPermission(Item.READ); if (!b) LOGGER.fine(String.format("Refusing to copy artifact from %s to %s because %s lacks Item.READ access",job,build, a)); boolean b = job.getACL().hasPermission( new UsernamePasswordAuthenticationToken("authenticated", "", new GrantedAuthority[]{ SecurityRealm.AUTHENTICATED_AUTHORITY }),
public <C extends IdCredentials> C lookupCredentials(@NonNull Class<C> type, @NonNull Run run, List<DomainRequirement> domainRequirements) { Authentication authentication = Jenkins.getAuthentication(); final Executor executor = run.getExecutor(); if (executor != null) { final WorkUnit workUnit = executor.getCurrentWorkUnit(); if (workUnit != null) { authentication = workUnit.context.item.authenticate(); } } List<C> candidates = new ArrayList<C>(); final boolean isSystem = ACL.SYSTEM.equals(authentication); if (!isSystem && run.getParent().getACL() .hasPermission(CredentialsProvider.USE_OWN)) { candidates.addAll(CredentialsProvider .lookupCredentials(type, run.getParent(), authentication, domainRequirements)); } if (run.getParent().getACL().hasPermission(CredentialsProvider.USE_ITEM) || isSystem || isDefaultValue) { candidates.addAll( CredentialsProvider.lookupCredentials(type, run.getParent(), ACL.SYSTEM, domainRequirements)); } return CredentialsMatchers.firstOrNull(candidates, CredentialsMatchers.withId(value)); }
public <C extends IdCredentials> C lookupCredentials(@NonNull Class<C> type, @NonNull Run run, List<DomainRequirement> domainRequirements) { Authentication authentication = Jenkins.getAuthentication(); final Executor executor = run.getExecutor(); if (executor != null) { final WorkUnit workUnit = executor.getCurrentWorkUnit(); if (workUnit != null) { authentication = workUnit.context.item.authenticate(); } } List<C> candidates = new ArrayList<C>(); final boolean isSystem = ACL.SYSTEM.equals(authentication); if (!isSystem && run.getParent().getACL() .hasPermission(CredentialsProvider.USE_OWN)) { candidates.addAll(CredentialsProvider .lookupCredentials(type, run.getParent(), authentication, domainRequirements)); } if (run.getParent().getACL().hasPermission(CredentialsProvider.USE_ITEM) || isSystem || isDefaultValue) { candidates.addAll( CredentialsProvider.lookupCredentials(type, run.getParent(), ACL.SYSTEM, domainRequirements)); } return CredentialsMatchers.firstOrNull(candidates, CredentialsMatchers.withId(value)); }
&& !job.job.getACL().hasPermission( new UsernamePasswordAuthenticationToken("authenticated", "", new GrantedAuthority[]{ SecurityRealm.AUTHENTICATED_AUTHORITY }),