X-Git-Url: http://git.freeside.biz/gitweb/?a=blobdiff_plain;f=rt%2Flib%2FRT%2FSharedSetting.pm;h=833308c1271b06336637d32602502c52ebc04764;hb=806d426d106efea2b2b13314108c4ac046511e1c;hp=74fe9d5a71adb3dbe3d9f9f29bdcc94f3b333c08;hpb=fc6209f398899f0211cfcedeb81a3cd65e04a941;p=freeside.git diff --git a/rt/lib/RT/SharedSetting.pm b/rt/lib/RT/SharedSetting.pm index 74fe9d5a7..833308c12 100644 --- a/rt/lib/RT/SharedSetting.pm +++ b/rt/lib/RT/SharedSetting.pm @@ -2,7 +2,7 @@ # # COPYRIGHT: # -# This software is Copyright (c) 1996-2011 Best Practical Solutions, LLC +# This software is Copyright (c) 1996-2012 Best Practical Solutions, LLC # # # (Except where explicitly superseded by other copyright notices) @@ -64,7 +64,9 @@ It consists of an ID, a name, and some arbitrary data. package RT::SharedSetting; use strict; use warnings; + use RT::Attribute; +use Scalar::Util 'blessed'; use base qw/RT::Base/; =head1 METHODS @@ -110,6 +112,9 @@ sub Load { return (0, $self->loc("Permission denied")) unless $self->CurrentUserCanSee; + my ($ok, $msg) = $self->PostLoadValidate; + return ($ok, $msg) if !$ok; + return (1, $self->loc("Loaded [_1] [_2]", $self->ObjectName, $self->Name)); } else { $RT::Logger->error("Could not load attribute " . $id @@ -150,12 +155,24 @@ sub LoadById { =head2 PostLoad -Called after after successful L. +Called after a successful L. =cut sub PostLoad { } +=head2 PostLoadValidate + +Called just before returning success from L; may be used to validate +that the record is correct. This method is expected to return a (ok, msg) +pair. + +=cut + +sub PostLoadValidate { + return 1; +} + =head2 Save Creates a new shared setting. Takes a privacy, a name, and any other arguments. @@ -257,11 +274,11 @@ where status is true upon success. sub Delete { my $self = shift; - return (0, $self->loc("Permission denied")) unless $self->CurrentUserCanDelete; my ($status, $msg) = $self->{'Attribute'}->Delete; + $self->CurrentUser->ClearAttributes; # force the current user's attribute cache to be cleaned up if ($status) { return (1, $self->loc("Deleted [_1]", $self->ObjectName)); } else { @@ -294,6 +311,9 @@ sub Id { return $self->{'Id'}; } +*id = \&Id; + + =head2 Privacy Returns the principal object to whom this shared setting belongs, in a string @@ -329,7 +349,7 @@ This does not deal with ACLs, this only looks at membership. sub IsVisibleTo { my $self = shift; my $to = shift; - my $privacy = $self->Privacy; + my $privacy = $self->Privacy || ''; # if the privacies are the same, then they can be seen. this handles # a personal setting being visible to that user. @@ -372,6 +392,11 @@ sub _GetObject { my $self = shift; my $privacy = shift; + # short circuit: if they pass the object we want anyway, just return it + if (blessed($privacy) && $privacy->isa('RT::Record')) { + return $privacy; + } + my ($obj_type, $obj_id) = split(/\-/, ($privacy || '')); unless ($obj_type && $obj_id) { @@ -395,7 +420,9 @@ sub _GetObject { return undef; } - if ($obj_type eq 'RT::Group' && !$object->HasMemberRecursively($self->CurrentUser->PrincipalObj)) { + if ( $obj_type eq 'RT::Group' + && !$object->HasMemberRecursively($self->CurrentUser->PrincipalObj) + && !$self->CurrentUser->HasRight( Object => $RT::System, Right => 'SuperUser' ) ) { $RT::Logger->debug("Permission denied, ".$self->CurrentUser->Name. " is not a member of group"); return undef; @@ -450,9 +477,42 @@ sub _build_privacy { : undef; } -eval "require RT::SharedSetting_Vendor"; -die $@ if ($@ && $@ !~ qr{^Can't locate RT/SharedSetting_Vendor.pm}); -eval "require RT::SharedSetting_Local"; -die $@ if ($@ && $@ !~ qr{^Can't locate RT/SharedSetting_Local.pm}); +=head2 ObjectsForLoading + +Returns a list of objects that can be used to load this shared setting. It +is ACL checked. + +=cut + +sub ObjectsForLoading { + my $self = shift; + return grep { $self->CurrentUserCanSee($_) } $self->_PrivacyObjects; +} + +=head2 ObjectsForCreating + +Returns a list of objects that can be used to create this shared setting. It +is ACL checked. + +=cut + +sub ObjectsForCreating { + my $self = shift; + return grep { $self->CurrentUserCanCreate($_) } $self->_PrivacyObjects; +} + +=head2 ObjectsForModifying + +Returns a list of objects that can be used to modify this shared setting. It +is ACL checked. + +=cut + +sub ObjectsForModifying { + my $self = shift; + return grep { $self->CurrentUserCanModify($_) } $self->_PrivacyObjects; +} + +RT::Base->_ImportOverlays(); 1;