aboutsummaryrefslogtreecommitdiff
path: root/src/org/traccar/database
diff options
context:
space:
mode:
Diffstat (limited to 'src/org/traccar/database')
-rw-r--r--src/org/traccar/database/CalendarManager.java4
-rw-r--r--src/org/traccar/database/DataManager.java8
-rw-r--r--src/org/traccar/database/DeviceManager.java8
-rw-r--r--src/org/traccar/database/GeofenceManager.java4
-rw-r--r--src/org/traccar/database/PermissionsManager.java59
5 files changed, 39 insertions, 44 deletions
diff --git a/src/org/traccar/database/CalendarManager.java b/src/org/traccar/database/CalendarManager.java
index d755bd396..31d484327 100644
--- a/src/org/traccar/database/CalendarManager.java
+++ b/src/org/traccar/database/CalendarManager.java
@@ -73,8 +73,8 @@ public class CalendarManager {
public Collection<Calendar> getManagedCalendars(long userId) {
ArrayList<Calendar> result = new ArrayList<>();
result.addAll(getUserCalendars(userId));
- for (long otherUserId : Context.getPermissionsManager().getUserPermissions(userId)) {
- result.addAll(getUserCalendars(otherUserId));
+ for (long managedUserId : Context.getPermissionsManager().getUserPermissions(userId)) {
+ result.addAll(getUserCalendars(managedUserId));
}
return result;
}
diff --git a/src/org/traccar/database/DataManager.java b/src/org/traccar/database/DataManager.java
index 2dea7ef40..8337762f7 100644
--- a/src/org/traccar/database/DataManager.java
+++ b/src/org/traccar/database/DataManager.java
@@ -534,17 +534,17 @@ public class DataManager {
.executeQuery(UserPermission.class);
}
- public void linkUser(long userId, long otherUserId) throws SQLException {
+ public void linkUser(long userId, long managedUserId) throws SQLException {
QueryBuilder.create(dataSource, getQuery("database.linkUser"))
.setLong("userId", userId)
- .setLong("otherUserId", otherUserId)
+ .setLong("managedUserId", managedUserId)
.executeUpdate();
}
- public void unlinkUser(long userId, long otherUserId) throws SQLException {
+ public void unlinkUser(long userId, long managedUserId) throws SQLException {
QueryBuilder.create(dataSource, getQuery("database.unlinkUser"))
.setLong("userId", userId)
- .setLong("otherUserId", otherUserId)
+ .setLong("managedUserId", managedUserId)
.executeUpdate();
}
}
diff --git a/src/org/traccar/database/DeviceManager.java b/src/org/traccar/database/DeviceManager.java
index bcb3185ca..8e75903db 100644
--- a/src/org/traccar/database/DeviceManager.java
+++ b/src/org/traccar/database/DeviceManager.java
@@ -163,8 +163,8 @@ public class DeviceManager implements IdentityManager {
public Collection<Device> getManagedDevices(long userId) throws SQLException {
Collection<Device> devices = new ArrayList<>();
devices.addAll(getDevices(userId));
- for (long otherUserId : Context.getPermissionsManager().getUserPermissions(userId)) {
- devices.addAll(getDevices(otherUserId));
+ for (long managedUserId : Context.getPermissionsManager().getUserPermissions(userId)) {
+ devices.addAll(getDevices(managedUserId));
}
return devices;
}
@@ -301,8 +301,8 @@ public class DeviceManager implements IdentityManager {
public Collection<Group> getManagedGroups(long userId) throws SQLException {
Collection<Group> groups = new ArrayList<>();
groups.addAll(getGroups(userId));
- for (long otherUserId : Context.getPermissionsManager().getUserPermissions(userId)) {
- groups.addAll(getGroups(otherUserId));
+ for (long managedUserId : Context.getPermissionsManager().getUserPermissions(userId)) {
+ groups.addAll(getGroups(managedUserId));
}
return groups;
}
diff --git a/src/org/traccar/database/GeofenceManager.java b/src/org/traccar/database/GeofenceManager.java
index adc93aa29..b8e6a5d73 100644
--- a/src/org/traccar/database/GeofenceManager.java
+++ b/src/org/traccar/database/GeofenceManager.java
@@ -245,8 +245,8 @@ public class GeofenceManager {
public final Set<Long> getManagedGeofencesIds(long userId) {
Set<Long> geofences = new HashSet<>();
geofences.addAll(getUserGeofencesIds(userId));
- for (long otherUserId : Context.getPermissionsManager().getUserPermissions(userId)) {
- geofences.addAll(getUserGeofencesIds(otherUserId));
+ for (long managedUserId : Context.getPermissionsManager().getUserPermissions(userId)) {
+ geofences.addAll(getUserGeofencesIds(managedUserId));
}
return geofences;
}
diff --git a/src/org/traccar/database/PermissionsManager.java b/src/org/traccar/database/PermissionsManager.java
index 3c62f84c2..c49ffb00c 100644
--- a/src/org/traccar/database/PermissionsManager.java
+++ b/src/org/traccar/database/PermissionsManager.java
@@ -30,7 +30,6 @@ import java.util.ArrayList;
import java.util.Collection;
import java.util.HashMap;
import java.util.HashSet;
-import java.util.Iterator;
import java.util.Map;
import java.util.Objects;
import java.util.Set;
@@ -114,7 +113,7 @@ public class PermissionsManager {
userPermissions.clear();
try {
for (UserPermission permission : dataManager.getUserPermissions()) {
- getUserPermissions(permission.getUserId()).add(permission.getOtherUserId());
+ getUserPermissions(permission.getUserId()).add(permission.getManagedUserId());
}
} catch (SQLException error) {
Log.warning(error);
@@ -250,27 +249,25 @@ public class PermissionsManager {
public void checkGroup(long userId, long groupId) throws SecurityException {
if (!getGroupPermissions(userId).contains(groupId) && !isAdmin(userId)) {
- Iterator<Long> iterator = getUserPermissions(userId).iterator();
- boolean managed = false;
- while (!managed && iterator.hasNext()) {
- managed = getGroupPermissions(iterator.next()).contains(groupId);
- }
- if (!managed) {
- throw new SecurityException("Group access denied");
+ checkManager(userId);
+ for (long managedUserId : getUserPermissions(userId)) {
+ if (getGroupPermissions(managedUserId).contains(groupId)) {
+ return;
+ }
}
+ throw new SecurityException("Group access denied");
}
}
public void checkDevice(long userId, long deviceId) throws SecurityException {
if (!getDevicePermissions(userId).contains(deviceId) && !isAdmin(userId)) {
- Iterator<Long> iterator = getUserPermissions(userId).iterator();
- boolean managed = false;
- while (!managed && iterator.hasNext()) {
- managed = getDevicePermissions(iterator.next()).contains(deviceId);
- }
- if (!managed) {
- throw new SecurityException("Device access denied");
+ checkManager(userId);
+ for (long managedUserId : getUserPermissions(userId)) {
+ if (getDevicePermissions(managedUserId).contains(deviceId)) {
+ return;
+ }
}
+ throw new SecurityException("Device access denied");
}
}
@@ -282,27 +279,25 @@ public class PermissionsManager {
public void checkGeofence(long userId, long geofenceId) throws SecurityException {
if (!Context.getGeofenceManager().checkGeofence(userId, geofenceId) && !isAdmin(userId)) {
- Iterator<Long> iterator = getUserPermissions(userId).iterator();
- boolean managed = false;
- while (!managed && iterator.hasNext()) {
- managed = Context.getGeofenceManager().checkGeofence(iterator.next(), geofenceId);
- }
- if (!managed) {
- throw new SecurityException("Geofence access denied");
+ checkManager(userId);
+ for (long managedUserId : getUserPermissions(userId)) {
+ if (Context.getGeofenceManager().checkGeofence(managedUserId, geofenceId)) {
+ return;
+ }
}
+ throw new SecurityException("Geofence access denied");
}
}
public void checkCalendar(long userId, long calendarId) throws SecurityException {
if (!Context.getCalendarManager().checkCalendar(userId, calendarId) && !isAdmin(userId)) {
- Iterator<Long> iterator = getUserPermissions(userId).iterator();
- boolean managed = false;
- while (!managed && iterator.hasNext()) {
- managed = Context.getCalendarManager().checkCalendar(iterator.next(), calendarId);
- }
- if (!managed) {
- throw new SecurityException("Calendar access denied");
+ checkManager(userId);
+ for (long managedUserId : getUserPermissions(userId)) {
+ if (Context.getCalendarManager().checkCalendar(managedUserId, calendarId)) {
+ return;
+ }
}
+ throw new SecurityException("Calendar access denied");
}
}
@@ -321,8 +316,8 @@ public class PermissionsManager {
public Collection<User> getUsers(long userId) {
Collection<User> result = new ArrayList<>();
- for (long otherUserId : getUserPermissions(userId)) {
- result.add(users.get(otherUserId));
+ for (long managedUserId : getUserPermissions(userId)) {
+ result.add(users.get(managedUserId));
}
return result;
}