def _checkProtection(self): RHProtected._checkProtection(self) if not self._doProcess: # Logged-in check failed return if not self._avatar.canUserModify(self._getUser()): raise errors.AccessControlError("user")
def _checkProtection( self ): RHProtected._checkProtection( self ) self._al = self._minfo.getAdminList() if not self._al.isAdmin( self._getUser() ): if self._getUser() != None and len( self._al.getList() )==0: return raise AdminError("area")
def _checkProtection(self): RHProtected._checkProtection(self) if not session.user and not self._doProcess: return self._al = HelperMaKaCInfo.getMaKaCInfoInstance().getAdminList() if not session.user.isAdmin(): if not self._al.getList(): # XXX can we just fail here instead of pretending the user is an admin?! return raise AdminError("area")
def _checkProtection( self ): RHProtected._checkSessionUser( self ) if not self._aw.getUser(): raise errors.AccessControlError("user")
def _checkParams(self, params): RHProtected._checkParams(self, params) self._minfo = HelperMaKaCInfo.getMaKaCInfoInstance()
def _checkProtection( self ): if self._group.getMemberList() == []: return RHProtected._checkProtection( self ) if not self._group.canModify( self._aw ): raise errors.ModificationError("group")
def _checkSessionUser(self): if not Config.getInstance().getIsRoomBookingActive(): raise NotFound(_('The room booking module is not enabled.')) RHProtected._checkSessionUser(self) if not rb_check_user_access(session.user): raise Forbidden(_('Your are not authorized to access the room booking system.'))
def _checkProtection( self ): RHProtected._checkProtection( self ) self._al = self._minfo.getAdminList() self._wm = webcast.HelperWebcastManager.getWebcastManagerInstance() if not self._wm.isManager( self._getUser() ) and not self._al.isAdmin( self._getUser() ): raise WebcastAdminError("management area")
def _checkProtection(self): RHProtected._checkProtection(self) if not self._avatar.canUserModify(self._getUser()): raise errors.AccessControlError("user")
def _checkProtection(self): RHProtected._checkSessionUser(self) if not self._aw.getUser(): raise errors.AccessControlError("user")
def _checkProtection(self): RHProtected._checkProtection(self) if not self._doProcess: # not logged in return if not self.user.can_be_modified(session.user): raise Forbidden('You cannot modify this user.')
def _checkProtection(self): RHProtected._checkProtection(self) if not self._avatar.canUserModify(self._getUser()): raise ModificationError("user")
def _checkProtection(self): if self._group.getMemberList() == []: return RHProtected._checkProtection(self) if not self._group.canModify(self._aw): raise errors.ModificationError("group")
def _checkProtection(self): RHProtected._checkProtection(self) if self._doProcess and not get_managed_vc_plugins(session.avatar): raise AccessError
def _checkProtection(self): RHProtected._checkProtection(self) if not get_managed_vc_plugins(session.user): raise Forbidden
def _checkProtection(self): RHProtected._checkProtection(self) if not can_manage_attachments(self.object, session.user): raise Forbidden
def _checkParams( self, params ): RHProtected._checkParams( self, params ) self._minfo = HelperMaKaCInfo.getMaKaCInfoInstance()
def _checkProtection(self): RHProtected._checkProtection(self) if not session.user and not self._doProcess: return if not session.user.is_admin: raise Forbidden(_("Only Indico administrators may access this page."))
def _checkProtection(self): RHProtected._checkProtection(self) if not session.user and not self._doProcess: return if not session.user.is_admin: raise AdminError("area")
def _checkProtection( self ): RHProtected._checkProtection( self ) if not self._avatar.canUserModify( self._getUser() ): raise ModificationError("user")
def _checkProtection( self ): RHProtected._checkProtection( self ) if not self._avatar.canUserModify( self._getUser() ): raise errors.AccessControlError("user")
def _checkProtection(self): RHProtected._checkProtection(self) if not session.avatar and not self._doProcess: return if not session.user.is_admin: raise AdminError("area")