def slice_belongs_to_pi (api, slice, pi):
return slice['site_id'] in pi['site_ids']
def slice_belongs_to_pi (api, slice, pi):
return slice['site_id'] in pi['site_ids']
# authorization methods - check if a given caller can set tag on this object
# called in {Add,Update,Delete}<Class>Tags methods, and in the accessors created in factory
# attach these as <Class>.caller_may_write_tag so accessors can find it
def caller_may_write_node_tag (node, api, caller, tag_type):
# authorization methods - check if a given caller can set tag on this object
# called in {Add,Update,Delete}<Class>Tags methods, and in the accessors created in factory
# attach these as <Class>.caller_may_write_tag so accessors can find it
def caller_may_write_node_tag (node, api, caller, tag_type):
pass
elif not AuthorizeHelpers.caller_may_access_tag_type (api, caller, tag_type):
raise PLCPermissionDenied, "Role mismatch for writing tag %s"%(tag_type['tagname'])
elif AuthorizeHelpers.node_belongs_to_person (api, node, caller):
pass
pass
elif not AuthorizeHelpers.caller_may_access_tag_type (api, caller, tag_type):
raise PLCPermissionDenied, "Role mismatch for writing tag %s"%(tag_type['tagname'])
elif AuthorizeHelpers.node_belongs_to_person (api, node, caller):
pass
def caller_may_write_interface_tag (interface, api, caller, tag_type):
def caller_may_write_interface_tag (interface, api, caller, tag_type):
pass
elif not AuthorizeHelpers.caller_may_access_tag_type (api, caller, tag_type):
raise PLCPermissionDenied, "Role mismatch for writing tag %s"%(tag_type['tagname'])
pass
elif not AuthorizeHelpers.caller_may_access_tag_type (api, caller, tag_type):
raise PLCPermissionDenied, "Role mismatch for writing tag %s"%(tag_type['tagname'])
def caller_may_write_site_tag (site, api, caller, tag_type):
def caller_may_write_site_tag (site, api, caller, tag_type):
pass
elif not AuthorizeHelpers.caller_may_access_tag_type (api, caller, tag_type):
raise PLCPermissionDenied, "Role mismatch for writing tag %s"%(tag_type['tagname'])
pass
elif not AuthorizeHelpers.caller_may_access_tag_type (api, caller, tag_type):
raise PLCPermissionDenied, "Role mismatch for writing tag %s"%(tag_type['tagname'])
def caller_may_write_person_tag (person, api, caller, tag_type):
def caller_may_write_person_tag (person, api, caller, tag_type):
pass
# user can change tags on self
elif AuthorizeHelpers.person_may_access_person (api, caller, person):
pass
# user can change tags on self
elif AuthorizeHelpers.person_may_access_person (api, caller, person):
def caller_may_write_slice_tag (slice, api, caller, tag_type, node_id_or_hostname=None, nodegroup_id_or_name=None):
granted=False
def caller_may_write_slice_tag (slice, api, caller, tag_type, node_id_or_hostname=None, nodegroup_id_or_name=None):
granted=False
granted=True
# does caller have right role(s) ? this knows how to deal with caller being a node
elif not AuthorizeHelpers.caller_may_access_tag_type (api, caller, tag_type):
granted=True
# does caller have right role(s) ? this knows how to deal with caller being a node
elif not AuthorizeHelpers.caller_may_access_tag_type (api, caller, tag_type):