##// END OF EJS Templates
caches: use repo.lru based Dict cache. This LRUDict uses Timing Algo to not have to use locking...
caches: use repo.lru based Dict cache. This LRUDict uses Timing Algo to not have to use locking for the LRU implementation, this it's safer to use for dogpile. We used it before with beaker, so it's generally more stable.

File last commit:

r2849:21c71a09 default
r2945:ec5716e4 default
Show More
repo_group_permissions.py
109 lines | 4.1 KiB | text/x-python | PythonLexer
/ rhodecode / apps / repo_group / views / repo_group_permissions.py
repo-groups: moved to pyramid
r2175 # -*- coding: utf-8 -*-
release: update copyright year to 2018
r2487 # Copyright (C) 2011-2018 RhodeCode GmbH
repo-groups: moved to pyramid
r2175 #
# This program is free software: you can redistribute it and/or modify
# it under the terms of the GNU Affero General Public License, version 3
# (only), as published by the Free Software Foundation.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU Affero General Public License
# along with this program. If not, see <http://www.gnu.org/licenses/>.
#
# This program is dual-licensed. If you wish to learn more about the
# RhodeCode Enterprise Edition, including its added features, Support services,
# and proprietary license terms, please see https://rhodecode.com/licenses/
import logging
from pyramid.view import view_config
from pyramid.httpexceptions import HTTPFound
events: add event to catch permission changed so we can flush affected users permission caches
r2849 from rhodecode import events
repo-groups: moved to pyramid
r2175 from rhodecode.apps._base import RepoGroupAppView
from rhodecode.lib import helpers as h
from rhodecode.lib import audit_logger
from rhodecode.lib.auth import (
LoginRequired, HasRepoGroupPermissionAnyDecorator, CSRFRequired)
from rhodecode.model.repo_group import RepoGroupModel
from rhodecode.model.forms import RepoGroupPermsForm
from rhodecode.model.meta import Session
log = logging.getLogger(__name__)
class RepoGroupPermissionsView(RepoGroupAppView):
def load_default_context(self):
c = self._get_local_tmpl_context()
pylons: remove pylons as dependency...
r2351
repo-groups: moved to pyramid
r2175 return c
@LoginRequired()
@HasRepoGroupPermissionAnyDecorator('group.admin')
@view_config(
route_name='edit_repo_group_perms', request_method='GET',
renderer='rhodecode:templates/admin/repo_groups/repo_group_edit.mako')
def edit_repo_group_permissions(self):
c = self.load_default_context()
c.active = 'permissions'
c.repo_group = self.db_repo_group
return self._get_template_context(c)
@LoginRequired()
@HasRepoGroupPermissionAnyDecorator('group.admin')
@CSRFRequired()
@view_config(
route_name='edit_repo_group_perms_update', request_method='POST',
renderer='rhodecode:templates/admin/repo_groups/repo_group_edit.mako')
def edit_repo_groups_permissions_update(self):
_ = self.request.translate
c = self.load_default_context()
c.active = 'perms'
c.repo_group = self.db_repo_group
valid_recursive_choices = ['none', 'repos', 'groups', 'all']
pylons: remove pylons as dependency...
r2351 form = RepoGroupPermsForm(self.request.translate, valid_recursive_choices)()\
repo-groups: moved to pyramid
r2175 .to_python(self.request.POST)
if not c.rhodecode_user.is_admin:
if self._revoke_perms_on_yourself(form):
msg = _('Cannot change permission for yourself as admin')
h.flash(msg, category='warning')
raise HTTPFound(
h.route_path('edit_repo_group_perms',
repo_groups: fix bad route on check if revoke permissions on yourself.
r2248 repo_group_name=self.db_repo_group_name))
repo-groups: moved to pyramid
r2175
# iterate over all members(if in recursive mode) of this groups and
# set the permissions !
# this can be potentially heavy operation
changes = RepoGroupModel().update_permissions(
c.repo_group,
form['perm_additions'], form['perm_updates'], form['perm_deletions'],
form['recursive'])
action_data = {
'added': changes['added'],
'updated': changes['updated'],
'deleted': changes['deleted'],
}
audit_logger.store_web(
'repo_group.edit.permissions', action_data=action_data,
user=c.rhodecode_user)
Session().commit()
h.flash(_('Repository Group permissions updated'), category='success')
events: add event to catch permission changed so we can flush affected users permission caches
r2849
affected_user_ids = []
for change in changes['added'] + changes['updated'] + changes['deleted']:
if change['type'] == 'user':
affected_user_ids.append(change['id'])
events.trigger(events.UserPermissionsChange(affected_user_ids))
repo-groups: moved to pyramid
r2175 raise HTTPFound(
h.route_path('edit_repo_group_perms',
repo_group_name=self.db_repo_group_name))