Lines Matching refs:acl

151         return 'acl';
196 $acl = $this->getCurrentUserPrivilegeSet($uri);
201 if (!in_array($priv, $acl)) {
273 * @param array $acl
276 function setDefaultAcl(array $acl) {
278 $this->defaultAcl = $acl;
430 * 'privilege' => '{DAV:}read-acl',
459 '{DAV:}read-acl' => [
498 $supportedPrivileges['{DAV:}write']['aggregates']['{DAV:}write-acl'] = [
595 $acl = $node->getACL();
597 $acl[] = [
603 return $acl;
624 $acl = $this->getACL($node);
630 foreach ($acl as $ace) {
841 '{DAV:}acl',
842 '{DAV:}acl-restrictions',
843 '{DAV:}inherited-acl-set',
855 $server->xml->elementMap['{DAV:}acl'] = 'Sabre\\DAVACL\\Xml\\Property\\Acl';
856 $server->xml->elementMap['{DAV:}acl-principal-prop-set'] = 'Sabre\\DAVACL\\Xml\\Request\\AclPrincipalPropSetReport';
910 $this->checkPrivileges($path, '{DAV:}write-acl');
1063 $propFind->handle('{DAV:}acl', function() use ($node, $propFind, $path) {
1065 if (!$this->checkPrivileges($path, '{DAV:}read-acl', self::R_PARENT, false)) {
1066 $propFind->set('{DAV:}acl', null, 403);
1068 $acl = $this->getACL($node);
1072 $propFind->handle('{DAV:}acl-restrictions', function() {
1150 case '{DAV:}acl-principal-prop-set' :
1151 $this->server->transactionType = 'acl-principal-prop-set';
1175 $acl = $this->server->xml->expect('{DAV:}acl', $body);
1176 $newAcl = $acl->getPrivileges();
1530 * This method is responsible for handling the {DAV:}acl-principal-prop-set
1547 throw new BadRequest('The {DAV:}acl-principal-prop-set REPORT only supports Depth 0');
1553 $acl = $this->server->getProperties($path, '{DAV:}acl');
1555 if (!$acl || !isset($acl['{DAV:}acl'])) {
1560 foreach ($acl['{DAV:}acl']->getPrivileges() as $ace) {
1632 'link' => 'http://sabre.io/dav/acl/',