public Boolean execute(CommandContext commandContext) { final AuthorizationManager authorizationManager = commandContext.getAuthorizationManager(); return authorizationManager.isAuthorized(userId, groupIds, permission, resource, resourceId); }
public Boolean execute(CommandContext commandContext) { final AuthorizationManager authorizationManager = commandContext.getAuthorizationManager(); return authorizationManager.isAuthorized(userId, groupIds, permission, resource, resourceId); }
public boolean isAuthorized(String userId, List<String> groupIds, Permission permission, Resource resource, String resourceId) { PermissionCheck permCheck = newPermissionCheck(); permCheck.setPermission(permission); permCheck.setResource(resource); permCheck.setResourceId(resourceId); ArrayList<PermissionCheck> permissionChecks = new ArrayList<PermissionCheck>(); permissionChecks.add(permCheck); return isAuthorized(userId, groupIds, permissionChecks); }
public boolean isAuthorized(String userId, List<String> groupIds, Permission permission, Resource resource, String resourceId) { PermissionCheck permCheck = newPermissionCheck(); permCheck.setPermission(permission); permCheck.setResource(resource); permCheck.setResourceId(resourceId); ArrayList<PermissionCheck> permissionChecks = new ArrayList<PermissionCheck>(); permissionChecks.add(permCheck); return isAuthorized(userId, groupIds, permissionChecks); }
public boolean isAuthorized(CompositePermissionCheck compositePermissionCheck) { Authentication currentAuthentication = getCurrentAuthentication(); if (currentAuthentication != null) { return isAuthorized(currentAuthentication.getUserId(), currentAuthentication.getGroupIds(), compositePermissionCheck); } else { return true; } }
public boolean isAuthorized(CompositePermissionCheck compositePermissionCheck) { Authentication currentAuthentication = getCurrentAuthentication(); if (currentAuthentication != null) { return isAuthorized(currentAuthentication.getUserId(), currentAuthentication.getGroupIds(), compositePermissionCheck); } else { return true; } }
protected boolean isAuthorized(Permission permission, Resource resource, String resourceId) { return !ldapConfiguration.isAuthorizationCheckEnabled() || org.camunda.bpm.engine.impl.context.Context.getCommandContext() .getAuthorizationManager() .isAuthorized(permission, resource, resourceId); }
public boolean isAuthorized(Permission permission, Resource resource, String resourceId) { // this will be called by LdapIdentityProviderSession#isAuthorized() for executing LdapQueries. // to be backward compatible a check whether authorization has been enabled inside the given // command context will not be done. final Authentication currentAuthentication = getCurrentAuthentication(); if(isAuthorizationEnabled() && currentAuthentication != null && currentAuthentication.getUserId() != null) { return isAuthorized(currentAuthentication.getUserId(), currentAuthentication.getGroupIds(), permission, resource, resourceId); } else { return true; } }
public boolean isAuthorized(Permission permission, Resource resource, String resourceId) { // this will be called by LdapIdentityProviderSession#isAuthorized() for executing LdapQueries. // to be backward compatible a check whether authorization has been enabled inside the given // command context will not be done. final Authentication currentAuthentication = getCurrentAuthentication(); if(isAuthorizationEnabled() && currentAuthentication != null && currentAuthentication.getUserId() != null) { return isAuthorized(currentAuthentication.getUserId(), currentAuthentication.getGroupIds(), permission, resource, resourceId); } else { return true; } }
public void checkAuthorization(CompositePermissionCheck compositePermissionCheck) { if(isAuthCheckExecuted()) { Authentication currentAuthentication = getCurrentAuthentication(); String userId = currentAuthentication.getUserId(); boolean isAuthorized = isAuthorized(compositePermissionCheck); if (!isAuthorized) { List<MissingAuthorization> missingAuthorizations = new ArrayList<MissingAuthorization>(); for (PermissionCheck check: compositePermissionCheck.getAllPermissionChecks()) { missingAuthorizations.add(new MissingAuthorization( check.getPermission().getName(), check.getResource().resourceName(), check.getResourceId())); } throw new AuthorizationException(userId, missingAuthorizations); } } }
public void checkAuthorization(List<PermissionCheck> permissionChecks) { if(isAuthCheckExecuted()) { Authentication currentAuthentication = getCurrentAuthentication(); String userId = currentAuthentication.getUserId(); boolean isAuthorized = isAuthorized(userId, currentAuthentication.getGroupIds(), permissionChecks); if (!isAuthorized) { List<MissingAuthorization> missingAuthorizations = new ArrayList<MissingAuthorization>(); for (PermissionCheck check: permissionChecks) { missingAuthorizations.add(new MissingAuthorization( check.getPermission().getName(), check.getResource().resourceName(), check.getResourceId())); } throw new AuthorizationException(userId, missingAuthorizations); } } }
public void checkAuthorization(List<PermissionCheck> permissionChecks) { if(isAuthCheckExecuted()) { Authentication currentAuthentication = getCurrentAuthentication(); String userId = currentAuthentication.getUserId(); boolean isAuthorized = isAuthorized(userId, currentAuthentication.getGroupIds(), permissionChecks); if (!isAuthorized) { List<MissingAuthorization> missingAuthorizations = new ArrayList<MissingAuthorization>(); for (PermissionCheck check: permissionChecks) { missingAuthorizations.add(new MissingAuthorization( check.getPermission().getName(), check.getResource().resourceName(), check.getResourceId())); } throw new AuthorizationException(userId, missingAuthorizations); } } }
public void checkAuthorization(CompositePermissionCheck compositePermissionCheck) { if(isAuthCheckExecuted()) { Authentication currentAuthentication = getCurrentAuthentication(); String userId = currentAuthentication.getUserId(); boolean isAuthorized = isAuthorized(compositePermissionCheck); if (!isAuthorized) { List<MissingAuthorization> missingAuthorizations = new ArrayList<MissingAuthorization>(); for (PermissionCheck check: compositePermissionCheck.getAllPermissionChecks()) { missingAuthorizations.add(new MissingAuthorization( check.getPermission().getName(), check.getResource().resourceName(), check.getResourceId())); } throw new AuthorizationException(userId, missingAuthorizations); } } }
@Override public void checkAuthorization(Permission permission, Resource resource, String resourceId) { if(isAuthCheckExecuted()) { Authentication currentAuthentication = getCurrentAuthentication(); boolean isAuthorized = isAuthorized(currentAuthentication.getUserId(), currentAuthentication.getGroupIds(), permission, resource, resourceId); if (!isAuthorized) { throw new AuthorizationException( currentAuthentication.getUserId(), permission.getName(), resource.resourceName(), resourceId); } } }
protected boolean ensureHistoryReadOnProcessDefinition(HistoricActivityStatisticsQueryImpl query) { CommandContext commandContext = getCommandContext(); if(isAuthorizationEnabled() && getCurrentAuthentication() != null && commandContext.isAuthorizationCheckEnabled()) { String processDefinitionId = query.getProcessDefinitionId(); ProcessDefinitionEntity definition = getProcessDefinitionManager().findLatestProcessDefinitionById(processDefinitionId); if (definition == null) { return false; } return getAuthorizationManager().isAuthorized(READ_HISTORY, PROCESS_DEFINITION, definition.getKey()); } return true; }
@Override public void checkAuthorization(Permission permission, Resource resource, String resourceId) { if(isAuthCheckExecuted()) { Authentication currentAuthentication = getCurrentAuthentication(); boolean isAuthorized = isAuthorized(currentAuthentication.getUserId(), currentAuthentication.getGroupIds(), permission, resource, resourceId); if (!isAuthorized) { throw new AuthorizationException( currentAuthentication.getUserId(), permission.getName(), resource.resourceName(), resourceId); } } }
protected boolean ensureHistoryReadOnProcessDefinition(HistoricActivityStatisticsQueryImpl query) { CommandContext commandContext = getCommandContext(); if(isAuthorizationEnabled() && getCurrentAuthentication() != null && commandContext.isAuthorizationCheckEnabled()) { String processDefinitionId = query.getProcessDefinitionId(); ProcessDefinitionEntity definition = getProcessDefinitionManager().findLatestProcessDefinitionById(processDefinitionId); if (definition == null) { return false; } return getAuthorizationManager().isAuthorized(READ_HISTORY, PROCESS_DEFINITION, definition.getKey()); } return true; }
public boolean isAuthorized(String userId, List<String> groupIds, Permission permission, Resource resource, String resourceId) { PermissionCheck permCheck = newPermissionCheck(); permCheck.setPermission(permission); permCheck.setResource(resource); permCheck.setResourceId(resourceId); ArrayList<PermissionCheck> permissionChecks = new ArrayList<PermissionCheck>(); permissionChecks.add(permCheck); return isAuthorized(userId, groupIds, permissionChecks); }
public boolean isAuthorized(CompositePermissionCheck compositePermissionCheck) { Authentication currentAuthentication = getCurrentAuthentication(); if (currentAuthentication != null) { return isAuthorized(currentAuthentication.getUserId(), currentAuthentication.getGroupIds(), compositePermissionCheck); } else { return true; } }
public boolean isAuthorized(Permission permission, Resource resource, String resourceId) { // this will be called by LdapIdentityProviderSession#isAuthorized() for executing LdapQueries. // to be backward compatible a check whether authorization has been enabled inside the given // command context will not be done. final Authentication currentAuthentication = getCurrentAuthentication(); if(isAuthorizationEnabled() && currentAuthentication != null && currentAuthentication.getUserId() != null) { return isAuthorized(currentAuthentication.getUserId(), currentAuthentication.getGroupIds(), permission, resource, resourceId); } else { return true; } }