Show More
@@ -223,8 +223,8 b' OUTPUT::' | |||||
223 | } |
|
223 | } | |
224 | error: null |
|
224 | error: null | |
225 |
|
225 | |||
226 |
add_user_to_users_group |
|
226 | add_user_to_users_group | |
227 |
----------------------- |
|
227 | ----------------------- | |
228 |
|
228 | |||
229 | Adds a user to a users group. This command can be executed only using api_key |
|
229 | Adds a user to a users group. This command can be executed only using api_key | |
230 | belonging to user with admin rights |
|
230 | belonging to user with admin rights | |
@@ -302,14 +302,14 b' OUTPUT::' | |||||
302 | "active" : "<bool>", |
|
302 | "active" : "<bool>", | |
303 | "admin" :Β "<bool>", |
|
303 | "admin" :Β "<bool>", | |
304 | "ldap" : "<ldap_dn>", |
|
304 | "ldap" : "<ldap_dn>", | |
305 |
"permission" : "repository |
|
305 | "permission" : "repository.(read|write|admin)" | |
306 | }, |
|
306 | }, | |
307 | β¦ |
|
307 | β¦ | |
308 | { |
|
308 | { | |
309 | "id" : "<usersgroupid>", |
|
309 | "id" : "<usersgroupid>", | |
310 | "name" : "<usersgroupname>", |
|
310 | "name" : "<usersgroupname>", | |
311 | "active": "<bool>", |
|
311 | "active": "<bool>", | |
312 |
"permission" : "repository |
|
312 | "permission" : "repository.(read|write|admin)" | |
313 | }, |
|
313 | }, | |
314 | β¦ |
|
314 | β¦ | |
315 | ] |
|
315 | ] | |
@@ -356,10 +356,27 b' INPUT::' | |||||
356 | args: { |
|
356 | args: { | |
357 | "repo_name" : "<reponame>", |
|
357 | "repo_name" : "<reponame>", | |
358 | "user_name" : "<username>", |
|
358 | "user_name" : "<username>", | |
359 |
"perm" : "(None|repository |
|
359 | "perm" : "(None|repository.(read|write|admin))", | |
360 | } |
|
360 | } | |
361 |
|
361 | |||
362 | OUTPUT:: |
|
362 | OUTPUT:: | |
363 |
|
363 | |||
364 | result: None |
|
364 | result: None | |
365 | error: null |
|
365 | error: null | |
|
366 | ||||
|
367 | add_users_group_to_repo | |||
|
368 | ----------------------- | |||
|
369 | ||||
|
370 | Add a users group to a repository. This command can be executed only using | |||
|
371 | api_key belonging to user with admin rights. If "perm" is None, group will | |||
|
372 | be removed from the repository. | |||
|
373 | ||||
|
374 | INPUT:: | |||
|
375 | ||||
|
376 | api_key : "<api_key>" | |||
|
377 | method : "add_users_group_to_repo" | |||
|
378 | args: { | |||
|
379 | "repo_name" : "<reponame>", | |||
|
380 | "group_name" : "<groupname>", | |||
|
381 | "perm" : "(None|repository.(read|write|admin))", | |||
|
382 | } No newline at end of file |
@@ -46,6 +46,7 b' from rhodecode.lib.auth import AuthUser' | |||||
46 |
|
46 | |||
47 | log = logging.getLogger('JSONRPC') |
|
47 | log = logging.getLogger('JSONRPC') | |
48 |
|
48 | |||
|
49 | ||||
49 | class JSONRPCError(BaseException): |
|
50 | class JSONRPCError(BaseException): | |
50 |
|
51 | |||
51 | def __init__(self, message): |
|
52 | def __init__(self, message): | |
@@ -67,7 +68,6 b' def jsonrpc_error(message, code=None):' | |||||
67 | return resp |
|
68 | return resp | |
68 |
|
69 | |||
69 |
|
70 | |||
70 |
|
||||
71 | class JSONRPCController(WSGIController): |
|
71 | class JSONRPCController(WSGIController): | |
72 | """ |
|
72 | """ | |
73 | A WSGI-speaking JSON-RPC controller class |
|
73 | A WSGI-speaking JSON-RPC controller class | |
@@ -120,10 +120,10 b' class JSONRPCController(WSGIController):' | |||||
120 | self._req_api_key = json_body['api_key'] |
|
120 | self._req_api_key = json_body['api_key'] | |
121 | self._req_id = json_body['id'] |
|
121 | self._req_id = json_body['id'] | |
122 | self._req_method = json_body['method'] |
|
122 | self._req_method = json_body['method'] | |
123 | self._req_params = json_body['args'] |
|
123 | self._request_params = json_body['args'] | |
124 | log.debug('method: %s, params: %s', |
|
124 | log.debug('method: %s, params: %s', | |
125 | self._req_method, |
|
125 | self._req_method, | |
126 | self._req_params) |
|
126 | self._request_params) | |
127 | except KeyError, e: |
|
127 | except KeyError, e: | |
128 | return jsonrpc_error(message='Incorrect JSON query missing %s' % e) |
|
128 | return jsonrpc_error(message='Incorrect JSON query missing %s' % e) | |
129 |
|
129 | |||
@@ -146,10 +146,11 b' class JSONRPCController(WSGIController):' | |||||
146 | # self.kargs and dispatch control to WGIController |
|
146 | # self.kargs and dispatch control to WGIController | |
147 | argspec = inspect.getargspec(self._func) |
|
147 | argspec = inspect.getargspec(self._func) | |
148 | arglist = argspec[0][1:] |
|
148 | arglist = argspec[0][1:] | |
149 | defaults = argspec[3] or [] |
|
149 | defaults = map(type, argspec[3] or []) | |
150 | default_empty = types.NotImplementedType |
|
150 | default_empty = types.NotImplementedType | |
151 |
|
151 | |||
152 | kwarglist = list(izip_longest(reversed(arglist), reversed(defaults), |
|
152 | # kw arguments required by this method | |
|
153 | func_kwargs = dict(izip_longest(reversed(arglist), reversed(defaults), | |||
153 | fillvalue=default_empty)) |
|
154 | fillvalue=default_empty)) | |
154 |
|
155 | |||
155 |
# this is little trick to inject logged in user for |
|
156 | # this is little trick to inject logged in user for | |
@@ -167,7 +168,7 b' class JSONRPCController(WSGIController):' | |||||
167 | (self._func.__name__, USER_SESSION_ATTR)) |
|
168 | (self._func.__name__, USER_SESSION_ATTR)) | |
168 |
|
169 | |||
169 | # get our arglist and check if we provided them as args |
|
170 | # get our arglist and check if we provided them as args | |
170 |
for arg, default in kwarg |
|
171 | for arg, default in func_kwargs.iteritems(): | |
171 | if arg == USER_SESSION_ATTR: |
|
172 | if arg == USER_SESSION_ATTR: | |
172 |
# USER_SESSION_ATTR is something translated from api key and |
|
173 | # USER_SESSION_ATTR is something translated from api key and | |
173 | # this is checked before so we don't need validate it |
|
174 | # this is checked before so we don't need validate it | |
@@ -175,13 +176,15 b' class JSONRPCController(WSGIController):' | |||||
175 |
|
176 | |||
176 |
# skip the required param check if it's default value is |
|
177 | # skip the required param check if it's default value is | |
177 | # NotImplementedType (default_empty) |
|
178 | # NotImplementedType (default_empty) | |
178 | if not self._req_params or (type(default) == default_empty |
|
179 | if (default == default_empty and arg not in self._request_params): | |
179 | and arg not in self._req_params): |
|
180 | return jsonrpc_error( | |
180 | return jsonrpc_error(message=('Missing non optional %s arg ' |
|
181 | message=( | |
181 |
|
|
182 | 'Missing non optional `%s` arg in JSON DATA' % arg | |
|
183 | ) | |||
|
184 | ) | |||
182 |
|
185 | |||
183 | self._rpc_args = {USER_SESSION_ATTR:u} |
|
186 | self._rpc_args = {USER_SESSION_ATTR: u} | |
184 | self._rpc_args.update(self._req_params) |
|
187 | self._rpc_args.update(self._request_params) | |
185 |
|
188 | |||
186 | self._rpc_args['action'] = self._req_method |
|
189 | self._rpc_args['action'] = self._req_method | |
187 | self._rpc_args['environ'] = environ |
|
190 | self._rpc_args['environ'] = environ | |
@@ -190,6 +193,7 b' class JSONRPCController(WSGIController):' | |||||
190 | status = [] |
|
193 | status = [] | |
191 | headers = [] |
|
194 | headers = [] | |
192 | exc_info = [] |
|
195 | exc_info = [] | |
|
196 | ||||
193 | def change_content(new_status, new_headers, new_exc_info=None): |
|
197 | def change_content(new_status, new_headers, new_exc_info=None): | |
194 | status.append(new_status) |
|
198 | status.append(new_status) | |
195 | headers.extend(new_headers) |
|
199 | headers.extend(new_headers) |
@@ -60,41 +60,47 b' class ApiController(JSONRPCController):' | |||||
60 | """" |
|
60 | """" | |
61 | Get a user by username |
|
61 | Get a user by username | |
62 |
|
62 | |||
63 | :param apiuser |
|
63 | :param apiuser: | |
64 | :param username |
|
64 | :param username: | |
65 | """ |
|
65 | """ | |
66 |
|
66 | |||
67 | user = User.get_by_username(username) |
|
67 | user = User.get_by_username(username) | |
68 | if not user: |
|
68 | if not user: | |
69 | return None |
|
69 | return None | |
70 |
|
70 | |||
71 |
return dict( |
|
71 | return dict( | |
|
72 | id=user.user_id, | |||
72 |
|
|
73 | username=user.username, | |
73 |
|
|
74 | firstname=user.name, | |
74 |
|
|
75 | lastname=user.lastname, | |
75 |
|
|
76 | email=user.email, | |
76 |
|
|
77 | active=user.active, | |
77 |
|
|
78 | admin=user.admin, | |
78 |
|
|
79 | ldap=user.ldap_dn | |
|
80 | ) | |||
79 |
|
81 | |||
80 | @HasPermissionAllDecorator('hg.admin') |
|
82 | @HasPermissionAllDecorator('hg.admin') | |
81 | def get_users(self, apiuser): |
|
83 | def get_users(self, apiuser): | |
82 | """" |
|
84 | """" | |
83 | Get all users |
|
85 | Get all users | |
84 |
|
86 | |||
85 | :param apiuser |
|
87 | :param apiuser: | |
86 | """ |
|
88 | """ | |
87 |
|
89 | |||
88 | result = [] |
|
90 | result = [] | |
89 | for user in User.getAll(): |
|
91 | for user in User.getAll(): | |
90 |
result.append( |
|
92 | result.append( | |
|
93 | dict( | |||
|
94 | id=user.user_id, | |||
91 |
|
|
95 | username=user.username, | |
92 |
|
|
96 | firstname=user.name, | |
93 |
|
|
97 | lastname=user.lastname, | |
94 |
|
|
98 | email=user.email, | |
95 |
|
|
99 | active=user.active, | |
96 |
|
|
100 | admin=user.admin, | |
97 |
|
|
101 | ldap=user.ldap_dn | |
|
102 | ) | |||
|
103 | ) | |||
98 | return result |
|
104 | return result | |
99 |
|
105 | |||
100 | @HasPermissionAllDecorator('hg.admin') |
|
106 | @HasPermissionAllDecorator('hg.admin') | |
@@ -131,8 +137,8 b' class ApiController(JSONRPCController):' | |||||
131 | """" |
|
137 | """" | |
132 | Get users group by name |
|
138 | Get users group by name | |
133 |
|
139 | |||
134 | :param apiuser |
|
140 | :param apiuser: | |
135 | :param group_name |
|
141 | :param group_name: | |
136 | """ |
|
142 | """ | |
137 |
|
143 | |||
138 | users_group = UsersGroup.get_by_group_name(group_name) |
|
144 | users_group = UsersGroup.get_by_group_name(group_name) | |
@@ -161,7 +167,7 b' class ApiController(JSONRPCController):' | |||||
161 | """" |
|
167 | """" | |
162 | Get all users groups |
|
168 | Get all users groups | |
163 |
|
169 | |||
164 | :param apiuser |
|
170 | :param apiuser: | |
165 | """ |
|
171 | """ | |
166 |
|
172 | |||
167 | result = [] |
|
173 | result = [] | |
@@ -210,9 +216,9 b' class ApiController(JSONRPCController):' | |||||
210 | """" |
|
216 | """" | |
211 | Add a user to a group |
|
217 | Add a user to a group | |
212 |
|
218 | |||
213 | :param apiuser |
|
219 | :param apiuser: | |
214 | :param group_name |
|
220 | :param group_name: | |
215 | :param user_name |
|
221 | :param user_name: | |
216 | """ |
|
222 | """ | |
217 |
|
223 | |||
218 | try: |
|
224 | try: | |
@@ -238,8 +244,8 b' class ApiController(JSONRPCController):' | |||||
238 | """" |
|
244 | """" | |
239 | Get repository by name |
|
245 | Get repository by name | |
240 |
|
246 | |||
241 | :param apiuser |
|
247 | :param apiuser: | |
242 | :param repo_name |
|
248 | :param repo_name: | |
243 | """ |
|
249 | """ | |
244 |
|
250 | |||
245 | repo = Repository.get_by_repo_name(repo_name) |
|
251 | repo = Repository.get_by_repo_name(repo_name) | |
@@ -250,7 +256,9 b' class ApiController(JSONRPCController):' | |||||
250 | for user in repo.repo_to_perm: |
|
256 | for user in repo.repo_to_perm: | |
251 | perm = user.permission.permission_name |
|
257 | perm = user.permission.permission_name | |
252 | user = user.user |
|
258 | user = user.user | |
253 |
members.append( |
|
259 | members.append( | |
|
260 | dict( | |||
|
261 | type_="user", | |||
254 |
|
|
262 | id=user.user_id, | |
255 |
|
|
263 | username=user.username, | |
256 |
|
|
264 | firstname=user.name, | |
@@ -259,36 +267,48 b' class ApiController(JSONRPCController):' | |||||
259 |
|
|
267 | active=user.active, | |
260 |
|
|
268 | admin=user.admin, | |
261 |
|
|
269 | ldap=user.ldap_dn, | |
262 |
|
|
270 | permission=perm | |
|
271 | ) | |||
|
272 | ) | |||
263 | for users_group in repo.users_group_to_perm: |
|
273 | for users_group in repo.users_group_to_perm: | |
264 | perm = users_group.permission.permission_name |
|
274 | perm = users_group.permission.permission_name | |
265 | users_group = users_group.users_group |
|
275 | users_group = users_group.users_group | |
266 |
members.append( |
|
276 | members.append( | |
|
277 | dict( | |||
|
278 | type_="users_group", | |||
267 |
|
|
279 | id=users_group.users_group_id, | |
268 |
|
|
280 | name=users_group.users_group_name, | |
269 |
|
|
281 | active=users_group.users_group_active, | |
270 |
|
|
282 | permission=perm | |
|
283 | ) | |||
|
284 | ) | |||
271 |
|
285 | |||
272 |
return dict( |
|
286 | return dict( | |
|
287 | id=repo.repo_id, | |||
273 |
|
|
288 | name=repo.repo_name, | |
274 |
|
|
289 | type=repo.repo_type, | |
275 |
|
|
290 | description=repo.description, | |
276 |
|
|
291 | members=members | |
|
292 | ) | |||
277 |
|
293 | |||
278 | @HasPermissionAnyDecorator('hg.admin') |
|
294 | @HasPermissionAnyDecorator('hg.admin') | |
279 | def get_repos(self, apiuser): |
|
295 | def get_repos(self, apiuser): | |
280 | """" |
|
296 | """" | |
281 | Get all repositories |
|
297 | Get all repositories | |
282 |
|
298 | |||
283 | :param apiuser |
|
299 | :param apiuser: | |
284 | """ |
|
300 | """ | |
285 |
|
301 | |||
286 | result = [] |
|
302 | result = [] | |
287 | for repository in Repository.getAll(): |
|
303 | for repository in Repository.getAll(): | |
288 |
result.append( |
|
304 | result.append( | |
|
305 | dict( | |||
|
306 | id=repository.repo_id, | |||
289 |
|
|
307 | name=repository.repo_name, | |
290 |
|
|
308 | type=repository.repo_type, | |
291 |
|
|
309 | description=repository.description | |
|
310 | ) | |||
|
311 | ) | |||
292 | return result |
|
312 | return result | |
293 |
|
313 | |||
294 | @HasPermissionAnyDecorator('hg.admin', 'hg.create.repository') |
|
314 | @HasPermissionAnyDecorator('hg.admin', 'hg.create.repository') | |
@@ -297,12 +317,12 b' class ApiController(JSONRPCController):' | |||||
297 | """ |
|
317 | """ | |
298 | Create a repository |
|
318 | Create a repository | |
299 |
|
319 | |||
300 | :param apiuser |
|
320 | :param apiuser: | |
301 | :param name |
|
321 | :param name: | |
302 | :param description |
|
322 | :param description: | |
303 | :param type |
|
323 | :param type: | |
304 | :param private |
|
324 | :param private: | |
305 | :param owner_name |
|
325 | :param owner_name: | |
306 | """ |
|
326 | """ | |
307 |
|
327 | |||
308 | try: |
|
328 | try: | |
@@ -321,18 +341,27 b' class ApiController(JSONRPCController):' | |||||
321 | for g in groups: |
|
341 | for g in groups: | |
322 | group = RepoGroup.get_by_group_name(g) |
|
342 | group = RepoGroup.get_by_group_name(g) | |
323 | if not group: |
|
343 | if not group: | |
324 |
group = ReposGroupModel().create( |
|
344 | group = ReposGroupModel().create( | |
|
345 | dict( | |||
|
346 | group_name=g, | |||
325 |
|
|
347 | group_description='', | |
326 |
|
|
348 | group_parent_id=parent_id | |
|
349 | ) | |||
|
350 | ) | |||
327 | parent_id = group.group_id |
|
351 | parent_id = group.group_id | |
328 |
|
352 | |||
329 |
RepoModel().create( |
|
353 | RepoModel().create( | |
|
354 | dict( | |||
|
355 | repo_name=real_name, | |||
330 |
|
|
356 | repo_name_full=name, | |
331 |
|
|
357 | description=description, | |
332 |
|
|
358 | private=private, | |
333 |
|
|
359 | repo_type=repo_type, | |
334 |
|
|
360 | repo_group=parent_id, | |
335 |
|
|
361 | clone_uri=None | |
|
362 | ), | |||
|
363 | owner | |||
|
364 | ) | |||
336 | Session.commit() |
|
365 | Session.commit() | |
337 | except Exception: |
|
366 | except Exception: | |
338 | log.error(traceback.format_exc()) |
|
367 | log.error(traceback.format_exc()) | |
@@ -343,10 +372,10 b' class ApiController(JSONRPCController):' | |||||
343 | """ |
|
372 | """ | |
344 | Add permission for a user to a repository |
|
373 | Add permission for a user to a repository | |
345 |
|
374 | |||
346 | :param apiuser |
|
375 | :param apiuser: | |
347 | :param repo_name |
|
376 | :param repo_name: | |
348 | :param user_name |
|
377 | :param user_name: | |
349 | :param perm |
|
378 | :param perm: | |
350 | """ |
|
379 | """ | |
351 |
|
380 | |||
352 | try: |
|
381 | try: | |
@@ -362,8 +391,54 b' class ApiController(JSONRPCController):' | |||||
362 | RepositoryPermissionModel()\ |
|
391 | RepositoryPermissionModel()\ | |
363 | .update_or_delete_user_permission(repo, user, perm) |
|
392 | .update_or_delete_user_permission(repo, user, perm) | |
364 | Session.commit() |
|
393 | Session.commit() | |
|
394 | ||||
|
395 | return dict( | |||
|
396 | msg='Added perm: %s for %s in repo: %s' % ( | |||
|
397 | perm, user_name, repo_name | |||
|
398 | ) | |||
|
399 | ) | |||
365 | except Exception: |
|
400 | except Exception: | |
366 | log.error(traceback.format_exc()) |
|
401 | log.error(traceback.format_exc()) | |
367 | raise JSONRPCError('failed to edit permission %(repo)s for %(user)s' |
|
402 | raise JSONRPCError( | |
368 | % dict(user=user_name, repo=repo_name)) |
|
403 | 'failed to edit permission %(repo)s for %(user)s' % dict( | |
|
404 | user=user_name, repo=repo_name | |||
|
405 | ) | |||
|
406 | ) | |||
|
407 | ||||
|
408 | @HasPermissionAnyDecorator('hg.admin') | |||
|
409 | def add_users_group_to_repo(self, apiuser, repo_name, group_name, perm): | |||
|
410 | """ | |||
|
411 | Add permission for a users group to a repository | |||
|
412 | ||||
|
413 | :param apiuser: | |||
|
414 | :param repo_name: | |||
|
415 | :param group_name: | |||
|
416 | :param perm: | |||
|
417 | """ | |||
|
418 | ||||
|
419 | try: | |||
|
420 | repo = Repository.get_by_repo_name(repo_name) | |||
|
421 | if repo is None: | |||
|
422 | raise JSONRPCError('unknown repository %s' % repo) | |||
369 |
|
423 | |||
|
424 | try: | |||
|
425 | user_group = UsersGroup.get_by_group_name(group_name) | |||
|
426 | except NoResultFound: | |||
|
427 | raise JSONRPCError('unknown users group %s' % user_group) | |||
|
428 | ||||
|
429 | RepositoryPermissionModel()\ | |||
|
430 | .update_or_delete_users_group_permission(repo, user_group, | |||
|
431 | perm) | |||
|
432 | Session.commit() | |||
|
433 | return dict( | |||
|
434 | msg='Added perm: %s for %s in repo: %s' % ( | |||
|
435 | perm, group_name, repo_name | |||
|
436 | ) | |||
|
437 | ) | |||
|
438 | except Exception: | |||
|
439 | log.error(traceback.format_exc()) | |||
|
440 | raise JSONRPCError( | |||
|
441 | 'failed to edit permission %(repo)s for %(usergr)s' % dict( | |||
|
442 | usergr=group_name, repo=repo_name | |||
|
443 | ) | |||
|
444 | ) |
@@ -6,8 +6,9 b'' | |||||
6 | repository permission model for RhodeCode |
|
6 | repository permission model for RhodeCode | |
7 |
|
7 | |||
8 | :created_on: Oct 1, 2011 |
|
8 | :created_on: Oct 1, 2011 | |
9 | :author: nvinot |
|
9 | :author: nvinot, marcink | |
10 | :copyright: (C) 2011-2011 Nicolas Vinot <aeris@imirhil.fr> |
|
10 | :copyright: (C) 2011-2011 Nicolas Vinot <aeris@imirhil.fr> | |
|
11 | :copyright: (C) 2009-2011 Marcin Kuzminski <marcin@python-works.com> | |||
11 | :license: GPLv3, see COPYING for more details. |
|
12 | :license: GPLv3, see COPYING for more details. | |
12 | """ |
|
13 | """ | |
13 | # This program is free software: you can redistribute it and/or modify |
|
14 | # This program is free software: you can redistribute it and/or modify | |
@@ -25,7 +26,7 b'' | |||||
25 |
|
26 | |||
26 | import logging |
|
27 | import logging | |
27 | from rhodecode.model import BaseModel |
|
28 | from rhodecode.model import BaseModel | |
28 | from rhodecode.model.db import UserRepoToPerm, Permission |
|
29 | from rhodecode.model.db import UserRepoToPerm, UsersGroupRepoToPerm, Permission | |
29 |
|
30 | |||
30 | log = logging.getLogger(__name__) |
|
31 | log = logging.getLogger(__name__) | |
31 |
|
32 | |||
@@ -39,6 +40,15 b' class RepositoryPermissionModel(BaseMode' | |||||
39 | .scalar() |
|
40 | .scalar() | |
40 |
|
41 | |||
41 | def update_user_permission(self, repository, user, permission): |
|
42 | def update_user_permission(self, repository, user, permission): | |
|
43 | ||||
|
44 | #TODO: REMOVE THIS !! | |||
|
45 | ################################ | |||
|
46 | import ipdb;ipdb.set_trace() | |||
|
47 | print 'setting ipdb debuggin for rhodecode.model.repo_permission.RepositoryPermissionModel.update_user_permission' | |||
|
48 | ################################ | |||
|
49 | ||||
|
50 | ||||
|
51 | ||||
42 | permission = Permission.get_by_key(permission) |
|
52 | permission = Permission.get_by_key(permission) | |
43 | current = self.get_user_permission(repository, user) |
|
53 | current = self.get_user_permission(repository, user) | |
44 | if current: |
|
54 | if current: | |
@@ -56,8 +66,41 b' class RepositoryPermissionModel(BaseMode' | |||||
56 | if current: |
|
66 | if current: | |
57 | self.sa.delete(current) |
|
67 | self.sa.delete(current) | |
58 |
|
68 | |||
|
69 | def get_users_group_permission(self, repository, users_group): | |||
|
70 | return UsersGroupRepoToPerm.query() \ | |||
|
71 | .filter(UsersGroupRepoToPerm.users_group == users_group) \ | |||
|
72 | .filter(UsersGroupRepoToPerm.repository == repository) \ | |||
|
73 | .scalar() | |||
|
74 | ||||
|
75 | def update_users_group_permission(self, repository, users_group, | |||
|
76 | permission): | |||
|
77 | permission = Permission.get_by_key(permission) | |||
|
78 | current = self.get_users_group_permission(repository, users_group) | |||
|
79 | if current: | |||
|
80 | if not current.permission is permission: | |||
|
81 | current.permission = permission | |||
|
82 | else: | |||
|
83 | p = UsersGroupRepoToPerm() | |||
|
84 | p.users_group = users_group | |||
|
85 | p.repository = repository | |||
|
86 | p.permission = permission | |||
|
87 | self.sa.add(p) | |||
|
88 | ||||
|
89 | def delete_users_group_permission(self, repository, users_group): | |||
|
90 | current = self.get_users_group_permission(repository, users_group) | |||
|
91 | if current: | |||
|
92 | self.sa.delete(current) | |||
|
93 | ||||
59 | def update_or_delete_user_permission(self, repository, user, permission): |
|
94 | def update_or_delete_user_permission(self, repository, user, permission): | |
60 | if permission: |
|
95 | if permission: | |
61 | self.update_user_permission(repository, user, permission) |
|
96 | self.update_user_permission(repository, user, permission) | |
62 | else: |
|
97 | else: | |
63 | self.delete_user_permission(repository, user) |
|
98 | self.delete_user_permission(repository, user) | |
|
99 | ||||
|
100 | def update_or_delete_users_group_permission(self, repository, user_group, | |||
|
101 | permission): | |||
|
102 | if permission: | |||
|
103 | self.update_users_group_permission(repository, user_group, | |||
|
104 | permission) | |||
|
105 | else: | |||
|
106 | self.delete_users_group_permission(repository, user_group) No newline at end of file |
General Comments 0
You need to be logged in to leave comments.
Login now