/** * Determine whether user and update the site * * @param siteId * The siteId for the site to test * * @return True * True if can update, False otherwise */ public boolean canUpdateSite(String siteId) { return securityService.unlock(UPDATE_PERMISSIONS, "/site/"+ siteId); }
private boolean isAllowed(String userId, String permission, String realmId) { if (securityService.unlock(userId, permission, realmId)) { return true; } return false; }
private boolean hasPermission(String reference, String permission) { return M_secs.unlock(permission, reference); } }
public static boolean unlock(java.lang.String param0, java.lang.String param1, java.lang.String param2) { org.sakaiproject.authz.api.SecurityService service = getInstance(); if (service == null) return false; return service.unlock(param0, param1, param2); }
public static boolean unlock(java.lang.String param0, java.lang.String param1, java.lang.String param2, java.util.Collection param3) { org.sakaiproject.authz.api.SecurityService service = getInstance(); if (service == null) return false; return service.unlock(param0, param1, param2, param3); }
public static boolean unlock(java.lang.String param0, java.lang.String param1) { org.sakaiproject.authz.api.SecurityService service = getInstance(); if (service == null) return false; return service.unlock(param0, param1); }
public static boolean unlock(org.sakaiproject.user.api.User param0, java.lang.String param1, java.lang.String param2) { org.sakaiproject.authz.api.SecurityService service = getInstance(); if (service == null) return false; return service.unlock(param0, param1, param2); }
public static boolean unlock(java.lang.String param0, java.lang.String param1, java.lang.String param2) { org.sakaiproject.authz.api.SecurityService service = getInstance(); if (service == null) return false; return service.unlock(param0, param1, param2); }
public static boolean unlock(java.lang.String param0, java.lang.String param1, java.lang.String param2, java.util.Collection param3) { org.sakaiproject.authz.api.SecurityService service = getInstance(); if (service == null) return false; return service.unlock(param0, param1, param2, param3); }
public static boolean unlock(org.sakaiproject.user.api.User param0, java.lang.String param1, java.lang.String param2) { org.sakaiproject.authz.api.SecurityService service = getInstance(); if (service == null) return false; return service.unlock(param0, param1, param2); }
public static boolean unlock(java.lang.String param0, java.lang.String param1) { org.sakaiproject.authz.api.SecurityService service = getInstance(); if (service == null) return false; return service.unlock(param0, param1); }
public boolean allowRemoveTags(TaggableActivity activity) { return securityService.unlock( AssignmentService.SECURE_REMOVE_ASSIGNMENT, activity .getReference()); }
/** * {@inheritDoc} */ public boolean isPubView(String id) { User anon = userDirectoryService.getAnonymousUser(); return m_securityService.unlock(anon, AUTH_RESOURCE_READ, getReference(id)); }
public boolean allowRemoveTags(TaggableItem item) { return securityService.unlock( AssignmentService.SECURE_REMOVE_ASSIGNMENT_SUBMISSION, parseSubmissionRef(item.getReference())); }
/** * {@inheritDoc} * @see org.sakaiproject.content.api.ContentHostingService#isRoleView(String, String) */ public boolean isRoleView(final String id, final String roleId) { if(roleId == null) { return false; } String dummyUserId = m_authzGroupService.encodeDummyUserForRole(roleId); return m_securityService.unlock(dummyUserId, AUTH_RESOURCE_READ, getReference(id)); }
public boolean canCurrentUserReadPost(Post post) { Site site = sakaiProxy.getSiteOrNull(post.getSiteId()); if (site != null) { return securityService.unlock(CommonsFunctions.POST_READ_ANY, "/site/" + post.getSiteId()); } else { return false; } }
protected boolean canSeeAllGroups(String userId, Site site){ if(site != null && site.getMember(userId) != null){ if(m_securityService.unlock(userId, eventId(SECURE_ALL_GROUPS), m_siteService.siteReference(site.getId()))){ return true; } } return false; }
protected boolean canSeeAllGroups(String userId, Site site){ if(site != null && site.getMember(userId) != null){ if(m_securityService.unlock(userId, eventId(SECURE_ALL_GROUPS), m_siteService.siteReference(site.getId()))){ return true; } } return false; }
public boolean checkLockOnCurrentUserAndSite(String authzfunction) { String context = toolmanager.getCurrentPlacement().getContext(); try { Site site = siteService.getSite(context); return securityService.unlock(authzfunction, site.getReference()); } catch (IdUnusedException e) { throw UniversalRuntimeException.accumulate(e, "Could not fetch the site for context " + context); } }
public boolean checkLockOnCurrentUserAndSite(String authzfunction) { String context = toolmanager.getCurrentPlacement().getContext(); try { Site site = siteService.getSite(context); return securityService.unlock(authzfunction, site.getReference()); } catch (IdUnusedException e) { throw UniversalRuntimeException.accumulate(e, "Could not fetch the site for context " + context); } }