All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.liferay.portal.service.impl.RoleServiceImpl Maven / Gradle / Ivy

/**
 * Copyright (c) 2000-present Liferay, Inc. All rights reserved.
 *
 * This library is free software; you can redistribute it and/or modify it under
 * the terms of the GNU Lesser General Public License as published by the Free
 * Software Foundation; either version 2.1 of the License, or (at your option)
 * any later version.
 *
 * This library is distributed in the hope that it will be useful, but WITHOUT
 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
 * FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more
 * details.
 */

package com.liferay.portal.service.impl;

import com.liferay.expando.kernel.model.ExpandoBridge;
import com.liferay.portal.kernel.exception.PortalException;
import com.liferay.portal.kernel.model.Group;
import com.liferay.portal.kernel.model.Role;
import com.liferay.portal.kernel.model.User;
import com.liferay.portal.kernel.model.role.RoleConstants;
import com.liferay.portal.kernel.security.membershippolicy.OrganizationMembershipPolicyUtil;
import com.liferay.portal.kernel.security.membershippolicy.RoleMembershipPolicyUtil;
import com.liferay.portal.kernel.security.membershippolicy.SiteMembershipPolicyUtil;
import com.liferay.portal.kernel.security.permission.ActionKeys;
import com.liferay.portal.kernel.service.ServiceContext;
import com.liferay.portal.kernel.service.permission.PortalPermissionUtil;
import com.liferay.portal.kernel.service.permission.RolePermissionUtil;
import com.liferay.portal.kernel.service.permission.UserPermissionUtil;
import com.liferay.portal.kernel.util.OrderByComparator;
import com.liferay.portal.service.base.RoleServiceBaseImpl;

import java.io.Serializable;

import java.util.ArrayList;
import java.util.LinkedHashMap;
import java.util.List;
import java.util.Locale;
import java.util.Map;

/**
 * Provides the remote service for accessing, adding, unassigning, checking,
 * deleting, and updating roles. Its methods include permission checks.
 *
 * @author Brian Wing Shun Chan
 */
public class RoleServiceImpl extends RoleServiceBaseImpl {

	/**
	 * Adds a role. The user is reindexed after role is added.
	 *
	 * @param  className the name of the class for which the role is created
	 * @param  classPK the primary key of the class for which the role is
	 *         created (optionally 0)
	 * @param  name the role's name
	 * @param  titleMap the role's localized titles (optionally
	 *         null)
	 * @param  descriptionMap the role's localized descriptions (optionally
	 *         null)
	 * @param  type the role's type (optionally 0)
	 * @param  subtype the role's subtype (optionally null)
	 * @param  serviceContext the service context to be applied (optionally
	 *         null). Can set the expando bridge attributes for the
	 *         role.
	 * @return the role
	 */
	@Override
	public Role addRole(
			String className, long classPK, String name,
			Map titleMap, Map descriptionMap,
			int type, String subtype, ServiceContext serviceContext)
		throws PortalException {

		PortalPermissionUtil.check(getPermissionChecker(), ActionKeys.ADD_ROLE);

		User user = getUser();

		Role role = roleLocalService.addRole(
			user.getUserId(), className, classPK, name, titleMap,
			descriptionMap, type, subtype, serviceContext);

		if (type == RoleConstants.TYPE_ORGANIZATION) {
			OrganizationMembershipPolicyUtil.verifyPolicy(role);
		}
		else if (type == RoleConstants.TYPE_SITE) {
			SiteMembershipPolicyUtil.verifyPolicy(role);
		}
		else {
			RoleMembershipPolicyUtil.verifyPolicy(role);
		}

		return role;
	}

	/**
	 * Adds the roles to the user. The user is reindexed after the roles are
	 * added.
	 *
	 * @param userId the primary key of the user
	 * @param roleIds the primary keys of the roles
	 */
	@Override
	public void addUserRoles(long userId, long[] roleIds)
		throws PortalException {

		if (roleIds.length == 0) {
			return;
		}

		checkUserRolesPermission(userId, roleIds);

		RoleMembershipPolicyUtil.checkRoles(new long[] {userId}, roleIds, null);

		roleLocalService.addUserRoles(userId, roleIds);

		RoleMembershipPolicyUtil.propagateRoles(
			new long[] {userId}, roleIds, null);
	}

	/**
	 * Deletes the role with the primary key and its associated permissions.
	 *
	 * @param roleId the primary key of the role
	 */
	@Override
	public void deleteRole(long roleId) throws PortalException {
		RolePermissionUtil.check(
			getPermissionChecker(), roleId, ActionKeys.DELETE);

		roleLocalService.deleteRole(roleId);
	}

	@Override
	public Role fetchRole(long roleId) throws PortalException {
		Role role = roleLocalService.fetchRole(roleId);

		if (role != null) {
			RolePermissionUtil.check(
				getPermissionChecker(), roleId, ActionKeys.VIEW);
		}

		return role;
	}

	/**
	 * Returns all the roles associated with the group.
	 *
	 * @param  groupId the primary key of the group
	 * @return the roles associated with the group
	 */
	@Override
	public List getGroupRoles(long groupId) throws PortalException {
		List roles = roleLocalService.getGroupRoles(groupId);

		return filterRoles(roles);
	}

	@Override
	public List getGroupRolesAndTeamRoles(
		long companyId, String keywords, List excludedNames,
		int[] types, long excludedTeamRoleId, long teamGroupId, int start,
		int end) {

		return roleFinder.filterFindByGroupRoleAndTeamRole(
			companyId, keywords, excludedNames, types, excludedTeamRoleId,
			teamGroupId, start, end);
	}

	@Override
	public int getGroupRolesAndTeamRolesCount(
		long companyId, String keywords, List excludedNames,
		int[] types, long excludedTeamRoleId, long teamGroupId) {

		return roleFinder.filterCountByGroupRoleAndTeamRole(
			companyId, keywords, excludedNames, types, excludedTeamRoleId,
			teamGroupId);
	}

	/**
	 * Returns the role with the primary key.
	 *
	 * @param  roleId the primary key of the role
	 * @return the role with the primary key
	 */
	@Override
	public Role getRole(long roleId) throws PortalException {
		RolePermissionUtil.check(
			getPermissionChecker(), roleId, ActionKeys.VIEW);

		return roleLocalService.getRole(roleId);
	}

	/**
	 * Returns the role with the name in the company.
	 *
	 * 

* The method searches the system roles map first for default roles. If a * role with the name is not found, then the method will query the database. *

* * @param companyId the primary key of the company * @param name the role's name * @return the role with the name */ @Override public Role getRole(long companyId, String name) throws PortalException { Role role = roleLocalService.getRole(companyId, name); RolePermissionUtil.check( getPermissionChecker(), role.getRoleId(), ActionKeys.VIEW); return role; } @Override public List getRoles(int type, String subtype) throws PortalException { return filterRoles(roleLocalService.getRoles(type, subtype)); } @Override public List getRoles(long companyId, int[] types) throws PortalException { return filterRoles(roleLocalService.getRoles(companyId, types)); } /** * Returns all the user's roles within the user group. * * @param userId the primary key of the user * @param groupId the primary key of the group * @return the user's roles within the user group */ @Override public List getUserGroupGroupRoles(long userId, long groupId) throws PortalException { UserPermissionUtil.check( getPermissionChecker(), userId, ActionKeys.VIEW); List roles = roleLocalService.getUserGroupGroupRoles( userId, groupId); return filterRoles(roles); } /** * Returns all the user's roles within the user group. * * @param userId the primary key of the user * @param groupId the primary key of the group * @return the user's roles within the user group */ @Override public List getUserGroupRoles(long userId, long groupId) throws PortalException { UserPermissionUtil.check( getPermissionChecker(), userId, ActionKeys.VIEW); List roles = roleLocalService.getUserGroupRoles(userId, groupId); return filterRoles(roles); } /** * Returns the union of all the user's roles within the groups. * * @param userId the primary key of the user * @param groups the groups (optionally null) * @return the union of all the user's roles within the groups */ @Override public List getUserRelatedRoles(long userId, List groups) throws PortalException { UserPermissionUtil.check( getPermissionChecker(), userId, ActionKeys.VIEW); List roles = roleLocalService.getUserRelatedRoles(userId, groups); return filterRoles(roles); } /** * Returns all the roles associated with the user. * * @param userId the primary key of the user * @return the roles associated with the user */ @Override public List getUserRoles(long userId) throws PortalException { UserPermissionUtil.check( getPermissionChecker(), userId, ActionKeys.VIEW); List roles = roleLocalService.getUserRoles(userId); return filterRoles(roles); } /** * Returns true if the user is associated with the named * regular role. * * @param userId the primary key of the user * @param companyId the primary key of the company * @param name the name of the role * @param inherited whether to include the user's inherited roles in the * search * @return true if the user is associated with the regular * role; false otherwise */ @Override public boolean hasUserRole( long userId, long companyId, String name, boolean inherited) throws PortalException { UserPermissionUtil.check( getPermissionChecker(), userId, ActionKeys.VIEW); return roleLocalService.hasUserRole(userId, companyId, name, inherited); } /** * Returns true if the user has any one of the named regular * roles. * * @param userId the primary key of the user * @param companyId the primary key of the company * @param names the names of the roles * @param inherited whether to include the user's inherited roles in the * search * @return true if the user has any one of the regular roles; * false otherwise */ @Override public boolean hasUserRoles( long userId, long companyId, String[] names, boolean inherited) throws PortalException { UserPermissionUtil.check( getPermissionChecker(), userId, ActionKeys.VIEW); return roleLocalService.hasUserRoles( userId, companyId, names, inherited); } @Override public List search( long companyId, String keywords, Integer[] types, LinkedHashMap params, int start, int end, OrderByComparator orderByComparator) { return roleFinder.filterFindByKeywords( companyId, keywords, types, params, start, end, orderByComparator); } @Override public int searchCount( long companyId, String keywords, Integer[] types, LinkedHashMap params) { return roleFinder.filterCountByKeywords( companyId, keywords, types, params); } /** * Removes the matching roles associated with the user. The user is * reindexed after the roles are removed. * * @param userId the primary key of the user * @param roleIds the primary keys of the roles */ @Override public void unsetUserRoles(long userId, long[] roleIds) throws PortalException { if (roleIds.length == 0) { return; } checkUserRolesPermission(userId, roleIds); RoleMembershipPolicyUtil.checkRoles(new long[] {userId}, null, roleIds); roleLocalService.unsetUserRoles(userId, roleIds); RoleMembershipPolicyUtil.propagateRoles( new long[] {userId}, null, roleIds); } /** * Updates the role with the primary key. * * @param roleId the primary key of the role * @param name the role's new name * @param titleMap the new localized titles (optionally null) * to replace those existing for the role * @param descriptionMap the new localized descriptions (optionally * null) to replace those existing for the role * @param subtype the role's new subtype (optionally null) * @param serviceContext the service context to be applied (optionally * null). Can set the expando bridge attributes for the * role. * @return the role with the primary key */ @Override public Role updateRole( long roleId, String name, Map titleMap, Map descriptionMap, String subtype, ServiceContext serviceContext) throws PortalException { RolePermissionUtil.check( getPermissionChecker(), roleId, ActionKeys.UPDATE); Role oldRole = rolePersistence.findByPrimaryKey(roleId); ExpandoBridge oldExpandoBridge = oldRole.getExpandoBridge(); Map oldExpandoAttributes = oldExpandoBridge.getAttributes(); Role role = roleLocalService.updateRole( roleId, name, titleMap, descriptionMap, subtype, serviceContext); if (role.getType() == RoleConstants.TYPE_ORGANIZATION) { OrganizationMembershipPolicyUtil.verifyPolicy( role, oldRole, oldExpandoAttributes); } else if (role.getType() == RoleConstants.TYPE_SITE) { SiteMembershipPolicyUtil.verifyPolicy( role, oldRole, oldExpandoAttributes); } else { RoleMembershipPolicyUtil.verifyPolicy( role, oldRole, oldExpandoAttributes); } return role; } protected void checkUserRolesPermission(long userId, long[] roleIds) throws PortalException { for (long roleId : roleIds) { RolePermissionUtil.check( getPermissionChecker(), roleId, ActionKeys.ASSIGN_MEMBERS); } } protected List filterRoles(List roles) throws PortalException { List filteredRoles = new ArrayList<>(); for (Role role : roles) { if (RolePermissionUtil.contains( getPermissionChecker(), role.getRoleId(), ActionKeys.VIEW)) { filteredRoles.add(role); } } return filteredRoles; } }




© 2015 - 2025 Weber Informatics LLC | Privacy Policy