Module: Dor::Governable
- Extended by:
- ActiveSupport::Concern
- Included in:
- Abstract
- Defined in:
- lib/dor/models/concerns/governable.rb
Instance Method Summary collapse
- #add_collection(collection_or_druid) ⇒ Object
- #can_manage_content?(roles) ⇒ Boolean
- #can_manage_desc_metadata?(roles) ⇒ Boolean
- #can_manage_embargo?(roles) ⇒ Boolean
- #can_manage_item?(roles) ⇒ Boolean
- #can_manage_rights?(roles) ⇒ Boolean
- #can_manage_system_metadata?(roles) ⇒ Boolean
- #can_view_content?(roles) ⇒ Boolean
- #can_view_metadata?(roles) ⇒ Boolean
-
#default_workflow_lane ⇒ String
Returns the default lane_id from the item’s APO.
- #groups_which_manage_content ⇒ Object
- #groups_which_manage_desc_metadata ⇒ Object
- #groups_which_manage_embargo ⇒ Object
- #groups_which_manage_item ⇒ Object
- #groups_which_manage_rights ⇒ Object
- #groups_which_manage_system_metadata ⇒ Object
- #groups_which_view_content ⇒ Object
- #groups_which_view_metadata ⇒ Object
- #initiate_apo_workflow(name) ⇒ Object
- #intersect(arr1, arr2) ⇒ Object
-
#reapplyAdminPolicyObjectDefaults ⇒ Object
set the rights metadata datastream to the content of the APO’s default object rights.
- #remove_collection(collection_or_druid) ⇒ Object
- #reset_to_apo_default ⇒ Object
- #rights ⇒ Object
- #set_read_rights(rights) ⇒ Object
- #unshelve_and_unpublish ⇒ Object
Instance Method Details
#add_collection(collection_or_druid) ⇒ Object
51 52 53 54 55 56 57 58 59 60 61 |
# File 'lib/dor/models/concerns/governable.rb', line 51 def add_collection(collection_or_druid) collection = case collection_or_druid when String Dor::Collection.find(collection_or_druid) when Dor::Collection collection_or_druid end collections << collection sets << collection end |
#can_manage_content?(roles) ⇒ Boolean
145 146 147 |
# File 'lib/dor/models/concerns/governable.rb', line 145 def can_manage_content?(roles) intersect roles, groups_which_manage_content end |
#can_manage_desc_metadata?(roles) ⇒ Boolean
137 138 139 |
# File 'lib/dor/models/concerns/governable.rb', line 137 def (roles) intersect roles, end |
#can_manage_embargo?(roles) ⇒ Boolean
153 154 155 |
# File 'lib/dor/models/concerns/governable.rb', line 153 def (roles) intersect roles, end |
#can_manage_item?(roles) ⇒ Boolean
133 134 135 |
# File 'lib/dor/models/concerns/governable.rb', line 133 def can_manage_item?(roles) intersect roles, groups_which_manage_item end |
#can_manage_rights?(roles) ⇒ Boolean
149 150 151 |
# File 'lib/dor/models/concerns/governable.rb', line 149 def can_manage_rights?(roles) intersect roles, groups_which_manage_rights end |
#can_manage_system_metadata?(roles) ⇒ Boolean
141 142 143 |
# File 'lib/dor/models/concerns/governable.rb', line 141 def (roles) intersect roles, end |
#can_view_content?(roles) ⇒ Boolean
157 158 159 |
# File 'lib/dor/models/concerns/governable.rb', line 157 def can_view_content?(roles) intersect roles, groups_which_view_content end |
#can_view_metadata?(roles) ⇒ Boolean
161 162 163 |
# File 'lib/dor/models/concerns/governable.rb', line 161 def (roles) intersect roles, end |
#default_workflow_lane ⇒ String
Returns the default lane_id from the item’s APO. Will return ‘default’ if the item does not have
and APO, or if the APO does not have a default_lane
18 19 20 21 22 23 24 25 26 27 |
# File 'lib/dor/models/concerns/governable.rb', line 18 def default_workflow_lane return 'default' if admin_policy_object.nil? # TODO: log warning? admin_md = admin_policy_object.datastreams['administrativeMetadata'] return 'default' unless admin_md.respond_to?(:default_workflow_lane) # Some APOs don't have this datastream lane = admin_md.default_workflow_lane return 'default' if lane.blank? lane end |
#groups_which_manage_content ⇒ Object
109 110 111 |
# File 'lib/dor/models/concerns/governable.rb', line 109 def groups_which_manage_content ['dor-administrator', 'sdr-administrator', 'dor-apo-manager', 'dor-apo-depositor'] end |
#groups_which_manage_desc_metadata ⇒ Object
101 102 103 |
# File 'lib/dor/models/concerns/governable.rb', line 101 def ['dor-administrator', 'sdr-administrator', 'dor-apo-manager', 'dor-apo-depositor', 'dor-apo-metadata'] end |
#groups_which_manage_embargo ⇒ Object
117 118 119 |
# File 'lib/dor/models/concerns/governable.rb', line 117 def ['dor-administrator', 'sdr-administrator', 'dor-apo-manager', 'dor-apo-depositor'] end |
#groups_which_manage_item ⇒ Object
97 98 99 |
# File 'lib/dor/models/concerns/governable.rb', line 97 def groups_which_manage_item ['dor-administrator', 'sdr-administrator', 'dor-apo-manager', 'dor-apo-depositor'] end |
#groups_which_manage_rights ⇒ Object
113 114 115 |
# File 'lib/dor/models/concerns/governable.rb', line 113 def groups_which_manage_rights ['dor-administrator', 'sdr-administrator', 'dor-apo-manager', 'dor-apo-depositor'] end |
#groups_which_manage_system_metadata ⇒ Object
105 106 107 |
# File 'lib/dor/models/concerns/governable.rb', line 105 def ['dor-administrator', 'sdr-administrator', 'dor-apo-manager', 'dor-apo-depositor'] end |
#groups_which_view_content ⇒ Object
121 122 123 |
# File 'lib/dor/models/concerns/governable.rb', line 121 def groups_which_view_content ['dor-administrator', 'sdr-administrator', 'dor-apo-manager', 'dor-apo-depositor', 'dor-viewer', 'sdr-viewer'] end |
#groups_which_view_metadata ⇒ Object
125 126 127 |
# File 'lib/dor/models/concerns/governable.rb', line 125 def ['dor-administrator', 'sdr-administrator', 'dor-apo-manager', 'dor-apo-depositor', 'dor-viewer', 'sdr-viewer'] end |
#initiate_apo_workflow(name) ⇒ Object
11 12 13 |
# File 'lib/dor/models/concerns/governable.rb', line 11 def initiate_apo_workflow(name) create_workflow(name, !self.new_record?) end |
#intersect(arr1, arr2) ⇒ Object
129 130 131 |
# File 'lib/dor/models/concerns/governable.rb', line 129 def intersect(arr1, arr2) (arr1 & arr2).length > 0 end |
#reapplyAdminPolicyObjectDefaults ⇒ Object
set the rights metadata datastream to the content of the APO’s default object rights
77 78 79 |
# File 'lib/dor/models/concerns/governable.rb', line 77 def reapplyAdminPolicyObjectDefaults rightsMetadata.content = admin_policy_object.datastreams['defaultObjectRights'].content end |
#remove_collection(collection_or_druid) ⇒ Object
63 64 65 66 67 68 69 70 71 72 73 74 |
# File 'lib/dor/models/concerns/governable.rb', line 63 def remove_collection(collection_or_druid) collection = case collection_or_druid when String Dor::Collection.find(collection_or_druid) when Dor::Collection collection_or_druid end collections.delete(collection) sets.delete(collection) end |
#reset_to_apo_default ⇒ Object
29 30 31 |
# File 'lib/dor/models/concerns/governable.rb', line 29 def reset_to_apo_default rightsMetadata.content = admin_policy_object.rightsMetadata.ng_xml end |
#rights ⇒ Object
81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 |
# File 'lib/dor/models/concerns/governable.rb', line 81 def rights return nil unless self.respond_to? :rightsMetadata return nil if rightsMetadata.nil? xml = rightsMetadata.ng_xml return nil if xml.search('//rightsMetadata').length != 1 # ORLY? if xml.search('//rightsMetadata/access[@type=\'read\']/machine/group').length == 1 'Stanford' elsif xml.search('//rightsMetadata/access[@type=\'read\']/machine/world').length == 1 'World' elsif xml.search('//rightsMetadata/access[@type=\'discover\']/machine/none').length == 1 'Dark' else 'None' end end |
#set_read_rights(rights) ⇒ Object
33 34 35 36 |
# File 'lib/dor/models/concerns/governable.rb', line 33 def set_read_rights(rights) rightsMetadata.set_read_rights(rights) unshelve_and_unpublish if rights == 'dark' end |
#unshelve_and_unpublish ⇒ Object
38 39 40 41 42 43 44 45 46 47 48 49 |
# File 'lib/dor/models/concerns/governable.rb', line 38 def unshelve_and_unpublish if self.respond_to? :contentMetadata content_ds = datastreams['contentMetadata'] unless content_ds.nil? content_ds.ng_xml.xpath('/contentMetadata/resource//file').each_with_index do |file_node, index| content_ds.ng_xml_will_change! if index == 0 file_node['publish'] = 'no' file_node['shelve'] = 'no' end end end end |