private static bool check( string sessionGuid_in, string ip_forLogPurposes_in, SO_CRD_Profile profile_in, out Sessionuser sessionUser_out, out List <int> errorlist_out ) { Guid _sessionguid; #region check... int[] _errors_out; if (!SBO_CRD_Authentication.isSessionGuid_valid( sessionGuid_in, ip_forLogPurposes_in, out _sessionguid, out sessionUser_out, out errorlist_out, out _errors_out )) { //// no need! //errors_out = _errors.ToArray(); return(false); } #endregion #region check Permissions... if ( !sessionUser_out.hasPermission( false, PermissionType.Profile__insert, PermissionType.Profile__update ) ) { errorlist_out.Add(ErrorType.profile__lack_of_permissions_to_write); return(false); } #endregion if (profile_in != null) { #region check Profile... if ( (profile_in.Name = profile_in.Name.Trim()).Length == 0 ) { errorlist_out.Add(ErrorType.profile__invalid_name); return(false); } #endregion } return(true); }
private static bool check( string sessionGuid_in, string ip_forLogPurposes_in, ref SO_NWS_Attachment attachment_ref, out Guid sessionGuid_out, out Sessionuser sessionUser_out, out List <int> errorlist_out ) { #region check... if (!SBO_CRD_Authentication.isSessionGuid_valid( sessionGuid_in, ip_forLogPurposes_in, out sessionGuid_out, out sessionUser_out, out errorlist_out )) { return(false); } #endregion #region check Permissions . . . if ( !sessionUser_out.hasPermission( false, PermissionType.News__insert, PermissionType.News__update_Approved, PermissionType.News__update_Mine_notApproved ) ) { errorlist_out.Add(ErrorType.news__lack_of_permissions_to_write); return(false); } #endregion #region //check Attachment ... (nothing to check!) #endregion return(true); }
private static bool check( string sessionGuid_in, string ip_forLogPurposes_in, ref SO_NWS_Author author_ref, out Guid sessionGuid_out, out Sessionuser sessionUser_out, out List <int> errorlist_out ) { #region check... if (!SBO_CRD_Authentication.isSessionGuid_valid( sessionGuid_in, ip_forLogPurposes_in, out sessionGuid_out, out sessionUser_out, out errorlist_out )) { return(false); } #endregion #region check Permissions... if ( !sessionUser_out.hasPermission( false, PermissionType.Author__insert, PermissionType.Author__update ) ) { errorlist_out.Add(ErrorType.author__lack_of_permissions_to_write); return(false); } if ( !sessionUser_out.hasPermission(PermissionType.Author__approve) && ( !author_ref.Approved_date_isNull || !author_ref.IFUser__Approved_isNull ) ) { errorlist_out.Add(ErrorType.author__lack_of_permissions_to_approve); return(false); } #endregion #region check Author... if ( (author_ref.Name = author_ref.Name.Trim()).Length == 0 ) { errorlist_out.Add(ErrorType.author__invalid_name); return(false); } #endregion return(true); }
internal static long insObject_CreateUser( Sessionuser sessionUser_in, string login_in, bool selectIdentity_in, ref List <int> errorlist_in, DBConnection con_in ) { long _output = -1L; // ToDos: here! must have permission to create user if (!sessionUser_in.hasPermission( PermissionType.User__insert )) { errorlist_in.Add(ErrorType.user__lack_of_permissions_to_write); return(_output); } if (!Sessionuser.checkLogin(login_in, ref errorlist_in)) { return(_output); } bool _constraint; _output = DO_CRD_User.insObject( new SO_CRD_User( -1L, login_in, // ToDos: here! encrypt before sending... login_in, // default: password = login sessionUser_in.IDApplication ), selectIdentity_in, out _constraint, con_in ); if (_constraint) { errorlist_in.Add(ErrorType.data__constraint_violation); } else { if (con_in == null) { // assuming NO other (internal) operations are going on errorlist_in.Add(ErrorType.user__successfully_created__WARNING); } } return(_output); }
private static bool check( string sessionGuid_in, string ip_forLogPurposes_in, ref SO_NWS_Source source_ref, out Guid sessionGuid_out, out Sessionuser sessionUser_out, out List <int> errorlist_out ) { #region check... if (!SBO_CRD_Authentication.isSessionGuid_valid( sessionGuid_in, ip_forLogPurposes_in, out sessionGuid_out, out sessionUser_out, out errorlist_out )) { return(false); } #endregion #region check Permissions . . . if ( !sessionUser_out.hasPermission( false, PermissionType.Source__insert, PermissionType.Source__update ) ) { errorlist_out.Add(ErrorType.source__lack_of_permissions_to_write); return(false); } if ( !sessionUser_out.hasPermission(PermissionType.Source__approve) && ( !source_ref.Approved_date_isNull || !source_ref.IFUser__Approved_isNull ) ) { errorlist_out.Add(ErrorType.source__lack_of_permissions_to_approve); return(false); } #endregion // ToDos: here! check parent existence // ToDos: here! check if parent within same application // ToDos: here! check if any other checkings needed ... if (source_ref.IFSource__parent <= 0) { source_ref.IFSource__parent_isNull = true; } #region check Source ... if ( (source_ref.Name = source_ref.Name.Trim()).Length == 0 ) { errorlist_out.Add(ErrorType.source__invalid_name); return(false); } #endregion return(true); }
private static bool check( string sessionGuid_in, string ip_forLogPurposes_in, ref SO_NWS_Tag tag_ref, OGen.NTier.Kick.Libraries.DataLayer.Shared.Structures.SO_DIC__TextLanguage[] tx_Name_in, out Guid sessionGuid_out, out Sessionuser sessionUser_out, out List <int> errorlist_out ) { #region check... if (!SBO_CRD_Authentication.isSessionGuid_valid( sessionGuid_in, ip_forLogPurposes_in, out sessionGuid_out, out sessionUser_out, out errorlist_out )) { return(false); } #endregion #region check Permissions . . . if ( !sessionUser_out.hasPermission( false, PermissionType.Tag__insert, PermissionType.Tag__update ) ) { errorlist_out.Add(ErrorType.tag__lack_of_permissions_to_write); return(false); } if ( !sessionUser_out.hasPermission(PermissionType.Tag__approve) && ( !tag_ref.Approved_date_isNull || !tag_ref.IFUser__Approved_isNull ) ) { errorlist_out.Add(ErrorType.tag__lack_of_permissions_to_approve); return(false); } #endregion // ToDos: here! check parent existence // ToDos: here! check if parent within same application // ToDos: here! check if any other checkings needed ... if (tag_ref.IFTag__parent <= 0) { tag_ref.IFTag__parent_isNull = true; } #region check Tag ... if ( (tx_Name_in == null) || (tx_Name_in.Length == 0) ) { errorlist_out.Add(ErrorType.tag__invalid_name); return(false); } else { foreach (SO_DIC__TextLanguage _tx_name in tx_Name_in) { if ( (_tx_name.Text = _tx_name.Text.Trim()).Length == 0 ) { errorlist_out.Add(ErrorType.tag__invalid_name); return(false); } } } #endregion return(true); }