mirror of
https://github.com/Alfresco/alfresco-community-repo.git
synced 2025-10-08 14:51:49 +00:00
RM-731: Impossible to add 'read and file' permissions for default categories
git-svn-id: https://svn.alfresco.com/repos/alfresco-enterprise/modules/recordsmanagement/BRANCHES/V2.0@55510 c4b6b30b-aa2e-2d43-bbcb-ca4b014f7261
This commit is contained in:
@@ -868,10 +868,13 @@ public class RecordsManagementSecurityServiceImpl implements RecordsManagementSe
|
|||||||
{
|
{
|
||||||
NodeRef parent = nodeService.getPrimaryParent(nodeRef).getParentRef();
|
NodeRef parent = nodeService.getPrimaryParent(nodeRef).getParentRef();
|
||||||
if (parent != null &&
|
if (parent != null &&
|
||||||
recordsManagementService.isFilePlan(parent) == false)
|
recordsManagementService.isFilePlanComponent(nodeRef) == true)
|
||||||
{
|
{
|
||||||
setPermissionImpl(parent, authority, RMPermissionModel.READ_RECORDS);
|
setPermissionImpl(parent, authority, RMPermissionModel.READ_RECORDS);
|
||||||
setReadPermissionUp(parent, authority);
|
if (recordsManagementService.isFilePlan(parent) == false)
|
||||||
|
{
|
||||||
|
setReadPermissionUp(parent, authority);
|
||||||
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@@ -910,7 +913,8 @@ public class RecordsManagementSecurityServiceImpl implements RecordsManagementSe
|
|||||||
*/
|
*/
|
||||||
private void setPermissionImpl(NodeRef nodeRef, String authority, String permission)
|
private void setPermissionImpl(NodeRef nodeRef, String authority, String permission)
|
||||||
{
|
{
|
||||||
if (RMPermissionModel.FILING.equals(permission) == true)
|
if (RMPermissionModel.FILING.equals(permission) == true &&
|
||||||
|
permissionService.getInheritParentPermissions(nodeRef) == false)
|
||||||
{
|
{
|
||||||
// Remove record read permission before adding filing permission
|
// Remove record read permission before adding filing permission
|
||||||
permissionService.deletePermission(nodeRef, authority, RMPermissionModel.READ_RECORDS);
|
permissionService.deletePermission(nodeRef, authority, RMPermissionModel.READ_RECORDS);
|
||||||
@@ -928,21 +932,25 @@ public class RecordsManagementSecurityServiceImpl implements RecordsManagementSe
|
|||||||
{
|
{
|
||||||
public Boolean doWork() throws Exception
|
public Boolean doWork() throws Exception
|
||||||
{
|
{
|
||||||
// Delete permission on this node
|
// can't delete permissions if inherited (eg hold and transfer containers)
|
||||||
permissionService.deletePermission(nodeRef, authority, permission);
|
if (permissionService.getInheritParentPermissions(nodeRef) == false)
|
||||||
|
|
||||||
if (recordsManagementService.isRecordCategory(nodeRef) == true)
|
|
||||||
{
|
{
|
||||||
List<ChildAssociationRef> assocs = nodeService.getChildAssocs(nodeRef, ContentModel.ASSOC_CONTAINS, RegexQNamePattern.MATCH_ALL);
|
// Delete permission on this node
|
||||||
for (ChildAssociationRef assoc : assocs)
|
permissionService.deletePermission(nodeRef, authority, permission);
|
||||||
{
|
|
||||||
NodeRef child = assoc.getChildRef();
|
if (recordsManagementService.isRecordCategory(nodeRef) == true)
|
||||||
if (recordsManagementService.isRecordCategory(child) == true ||
|
{
|
||||||
recordsManagementService.isRecordFolder(child) == true)
|
List<ChildAssociationRef> assocs = nodeService.getChildAssocs(nodeRef, ContentModel.ASSOC_CONTAINS, RegexQNamePattern.MATCH_ALL);
|
||||||
{
|
for (ChildAssociationRef assoc : assocs)
|
||||||
deletePermission(child, authority, permission);
|
{
|
||||||
}
|
NodeRef child = assoc.getChildRef();
|
||||||
}
|
if (recordsManagementService.isRecordCategory(child) == true ||
|
||||||
|
recordsManagementService.isRecordFolder(child) == true)
|
||||||
|
{
|
||||||
|
deletePermission(child, authority, permission);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return null;
|
return null;
|
||||||
|
Reference in New Issue
Block a user