Ejemplo n.º 1
0
def __pi_submitted_signatories(context):
    __make_owner_signatory(context)
    for signatory in context.signatories.values():
        owner_login = utils.get_owner_login_pi(signatory)
        utils.assign_owner_role(signatory, owner_login)
        utils.assign_signatory_role(context, owner_login)
    utils.pi_update_signatories(context)
Ejemplo n.º 2
0
def __pi_submitted_signatories(context):
    __make_owner_signatory(context)
    for signatory in context.signatories.values():
        owner_login = utils.get_owner_login_pi(signatory)
        utils.assign_owner_role(signatory, owner_login)
        utils.assign_signatory_role(context, owner_login)
    utils.pi_update_signatories(context)
Ejemplo n.º 3
0
def _signatory_awaiting_consent(context):
    """Done when parent object is already in submitted_signatories stage.
    Otherwise roles assignment is handled by `__pi_assign_signatory_roles`
    """
    if context.item.status == u"submitted_signatories":
        owner_login = utils.get_owner_login_pi(context)
        utils.assign_owner_role(context, owner_login)
        utils.assign_signatory_role(context.item, owner_login)
Ejemplo n.º 4
0
def _signatory_awaiting_consent(context):
    """Done when parent object is already in submitted_signatories stage.
    Otherwise roles assignment is handled by `__pi_assign_signatory_roles`
    """
    if context.item.status == u"submitted_signatories":
        owner_login = utils.get_owner_login_pi(context)
        utils.assign_owner_role(context, owner_login)
        utils.assign_signatory_role(context.item, owner_login)
Ejemplo n.º 5
0
def signatory_deleted(ob, event):
    """Clear signatory role for a deleted signatory
    """
    ob = removeSecurityProxy(ob)
    if ob.user:
        owner_login = get_owner_login_pi(ob)
        assign_signatory_role(ob.item, owner_login, unset=True)
    else:
        log.warning("Signatory object %s has no user set."
            " Skipping unsetting of role", ob.__str__()
        )
Ejemplo n.º 6
0
def user_is_context_owner(context):
    """Test if current user is the context owner e.g. to check if someone 
        manipulating the context object is other than the owner of the object.
        
        A delegate is considered to be an owner of the object
    """
    user = model_utils.get_db_user()
    owner_login = utils.get_owner_login_pi(context)
    if user.login == owner_login:
        return True
    delegations = delegation.get_user_delegations(user.user_id)
    users = [delegate.login for delegate in delegations]
    return owner_login in users
Ejemplo n.º 7
0
def user_is_context_owner(context):
    """Test if current user is the context owner e.g. to check if someone 
        manipulating the context object is other than the owner of the object.
        
        A delegate is considered to be an owner of the object
    """
    user = model_utils.get_db_user()
    owner_login = utils.get_owner_login_pi(context)
    if user.login == owner_login:
        return True
    delegations = delegation.get_user_delegations(user.user_id)
    users = [delegate.login for delegate in delegations]
    return owner_login in users
Ejemplo n.º 8
0
def user_is_context_owner(context):
    """Test if current user is the context owner e.g. to check if someone 
        manipulating the context object is other than the owner of the object.
        
        A delegate is considered to be an owner of the object
    """
    user = model_utils.get_db_user()
    owner_login = utils.get_owner_login_pi(context)
    session = Session()
    delegations = session.query(domain.User) \
                    .join((domain.UserDelegation, domain.User.user_id
                                        ==domain.UserDelegation.user_id)) \
                    .filter(domain.UserDelegation.delegation_id == user.user_id) \
                    .all()
    users = [delegate.login for delegate in delegations]
    users.append(owner_login) 
    return user.login in users
Ejemplo n.º 9
0
def user_is_context_owner(context):
    """Test if current user is the context owner e.g. to check if someone 
        manipulating the context object is other than the owner of the object.
        
        A delegate is considered to be an owner of the object
    """
    user = model_utils.get_db_user()
    owner_login = utils.get_owner_login_pi(context)
    session = Session()
    delegations = session.query(domain.User) \
                    .join((domain.UserDelegation, domain.User.user_id
                                        ==domain.UserDelegation.user_id)) \
                    .filter(domain.UserDelegation.delegation_id == user.user_id) \
                    .all()
    users = [delegate.login for delegate in delegations]
    users.append(owner_login)
    return user.login in users
Ejemplo n.º 10
0
def user_is_parent_document_owner(context):
    return (utils.get_owner_login_pi(context) == utils.get_owner_login_pi(
        context.head))
Ejemplo n.º 11
0
def user_is_parent_document_owner(context):
    return (
        utils.get_owner_login_pi(context) ==
        utils.get_owner_login_pi(context.item)
    )
Ejemplo n.º 12
0
def _signatory_rejected(context):
    owner_login = utils.get_owner_login_pi(context)
    utils.assign_signatory_role(context.item, owner_login, unset=True)
Ejemplo n.º 13
0
def _signatory_rejected(context):
    owner_login = utils.get_owner_login_pi(context)
    utils.assign_signatory_role(context.item, owner_login, unset=True)