|
7 | 7 | import com.jgcomptech.tools.events.EventTarget; |
8 | 8 | import com.jgcomptech.tools.events.PermissionEvent; |
9 | 9 |
|
10 | | -import java.util.Arrays; |
11 | | -import java.util.HashMap; |
12 | | -import java.util.HashSet; |
13 | | -import java.util.Set; |
| 10 | +import java.util.*; |
14 | 11 | import java.util.stream.Collectors; |
15 | 12 |
|
16 | 13 | /** |
@@ -38,10 +35,10 @@ public static synchronized PermissionManager getInstance() { |
38 | 35 | if(instance == null) { |
39 | 36 | instance = new PermissionManager(); |
40 | 37 | instance.permissions = new HashMap<>(); |
41 | | - instance.addCustomPermission(SystemPermissions.Admin.name, null); |
42 | | - instance.addCustomPermission(SystemPermissions.Edit.name, null); |
43 | | - instance.addCustomPermission(SystemPermissions.Create.name, null); |
44 | | - instance.addCustomPermission(SystemPermissions.Read.name, null); |
| 38 | + instance.addCustomPermission(SystemPermissions.Admin.getName(), null); |
| 39 | + instance.addCustomPermission(SystemPermissions.Edit.getName(), null); |
| 40 | + instance.addCustomPermission(SystemPermissions.Create.getName(), null); |
| 41 | + instance.addCustomPermission(SystemPermissions.Read.getName(), null); |
45 | 42 |
|
46 | 43 | try { |
47 | 44 | instance.eventPermissionsApplied = |
@@ -162,76 +159,76 @@ public void disableDebugLogging() { |
162 | 159 | * Returns true if Admin permission is enabled. |
163 | 160 | * @return true if Admin permission is enabled |
164 | 161 | */ |
165 | | - public boolean isAdminPermissionEnabled() { return permissions.get(SystemPermissions.Admin.name).isEnabled(); } |
| 162 | + public boolean isAdminPermissionEnabled() { return permissions.get(SystemPermissions.Admin.getName()).isEnabled(); } |
166 | 163 | /** |
167 | 164 | * Returns true if Edit permission is enabled. |
168 | 165 | * @return true if Edit permission is enabled |
169 | 166 | */ |
170 | | - public boolean isEditPermissionEnabled() { return permissions.get(SystemPermissions.Edit.name).isEnabled(); } |
| 167 | + public boolean isEditPermissionEnabled() { return permissions.get(SystemPermissions.Edit.getName()).isEnabled(); } |
171 | 168 | /** |
172 | 169 | * Returns true if Create permission is enabled. |
173 | 170 | * @return true if Create permission is enabled |
174 | 171 | */ |
175 | | - public boolean isCreatePermissionEnabled() { return permissions.get(SystemPermissions.Create.name).isEnabled(); } |
| 172 | + public boolean isCreatePermissionEnabled() { return permissions.get(SystemPermissions.Create.getName()).isEnabled(); } |
176 | 173 | /** |
177 | 174 | * Returns true if Read permission is enabled. |
178 | 175 | * @return true if Read permission is enabled |
179 | 176 | */ |
180 | | - public boolean isReadPermissionEnabled() { return permissions.get(SystemPermissions.Read.name).isEnabled(); } |
| 177 | + public boolean isReadPermissionEnabled() { return permissions.get(SystemPermissions.Read.getName()).isEnabled(); } |
181 | 178 |
|
182 | 179 | /** |
183 | 180 | * Manually sets the status of the Admin permission. |
184 | 181 | * @param value the value to set |
185 | 182 | */ |
186 | 183 | public void setAdminPermission(final boolean value) { |
187 | | - permissions.get(SystemPermissions.Admin.name).setEnabled(value); } |
| 184 | + permissions.get(SystemPermissions.Admin.getName()).setEnabled(value); } |
188 | 185 | /** |
189 | 186 | * Manually sets the status of the Edit permission. |
190 | 187 | * @param value the value to set |
191 | 188 | */ |
192 | 189 | public void setEditPermission(final boolean value) { |
193 | | - permissions.get(SystemPermissions.Edit.name).setEnabled(value); } |
| 190 | + permissions.get(SystemPermissions.Edit.getName()).setEnabled(value); } |
194 | 191 | /** |
195 | 192 | * Manually sets the status of the Create permission. |
196 | 193 | * @param value the value to set |
197 | 194 | */ |
198 | 195 | public void setCreatePermission(final boolean value) { |
199 | | - permissions.get(SystemPermissions.Create.name).setEnabled(value); } |
| 196 | + permissions.get(SystemPermissions.Create.getName()).setEnabled(value); } |
200 | 197 | /** |
201 | 198 | * Manually sets the status of the Read permission. |
202 | 199 | * @param value the value to set |
203 | 200 | */ |
204 | 201 | public void setReadPermission(final boolean value) { |
205 | | - permissions.get(SystemPermissions.Read.name).setEnabled(value); } |
| 202 | + permissions.get(SystemPermissions.Read.getName()).setEnabled(value); } |
206 | 203 |
|
207 | 204 | /** |
208 | 205 | * Returns the Admin permission. |
209 | 206 | * @return the permission object |
210 | 207 | */ |
211 | | - public Permission getAdminPermission() { return permissions.get(SystemPermissions.Admin.name); } |
| 208 | + public Permission getAdminPermission() { return permissions.get(SystemPermissions.Admin.getName()); } |
212 | 209 | /** |
213 | 210 | * Returns the Edit permission. |
214 | 211 | * @return the permission object |
215 | 212 | */ |
216 | | - public Permission getEditPermission() { return permissions.get(SystemPermissions.Edit.name); } |
| 213 | + public Permission getEditPermission() { return permissions.get(SystemPermissions.Edit.getName()); } |
217 | 214 | /** |
218 | 215 | * Returns the Create permission. |
219 | 216 | * @return the permission object |
220 | 217 | */ |
221 | | - public Permission getCreatePermission() { return permissions.get(SystemPermissions.Create.name); } |
| 218 | + public Permission getCreatePermission() { return permissions.get(SystemPermissions.Create.getName()); } |
222 | 219 | /** |
223 | 220 | * Returns the Read permission. |
224 | 221 | * @return the permission object |
225 | 222 | */ |
226 | | - public Permission getReadPermission() { return permissions.get(SystemPermissions.Read.name); } |
| 223 | + public Permission getReadPermission() { return permissions.get(SystemPermissions.Read.getName()); } |
227 | 224 |
|
228 | 225 | //endregion System Permissions |
229 | 226 |
|
230 | 227 | /** |
231 | 228 | * Returns a HashMap of all existing permission objects. |
232 | 229 | * @return a HashMap of all existing permission objects |
233 | 230 | */ |
234 | | - public HashMap<String, Permission> getPermissions() { return permissions; } |
| 231 | + public Map<String, Permission> getPermissions() { return permissions; } |
235 | 232 |
|
236 | 233 | /** |
237 | 234 | * Returns a list of names of existing permissions. |
@@ -450,10 +447,7 @@ public void loadPermissions(final boolean enableAll) { |
450 | 447 | * @since 1.5.0 now uses a parallel stream allowing a large list of permissions |
451 | 448 | */ |
452 | 449 | public void loadPermissions(final UserRole userRole) { |
453 | | - getAdminPermission().disable(); |
454 | | - getEditPermission().disable(); |
455 | | - getCreatePermission().disable(); |
456 | | - getReadPermission().disable(); |
| 450 | + permissions.values().parallelStream().forEach(Permission::disable); |
457 | 451 | userRole.getPermissions().parallelStream().forEach(this::enablePermission); |
458 | 452 | eventPermissionsApplied.fireEvent(this, userRole); |
459 | 453 | } |
|
0 commit comments