def _check_access(self): if not session.user: raise Forbidden # If the user cannot manage the whole event see if anything gives them # limited management access. if not self.event.can_manage(session.user): urls = sorted(values_from_signal(signals.event_management.management_url.send(self.event), single_value=True)) response = redirect(urls[0]) if urls else None raise Forbidden(response=response) RHManageEventBase._check_access(self) # mainly to trigger the legacy "event locked" check
def _check_access(self): if not session.user: raise Forbidden # If the user cannot manage the whole event see if anything gives them # limited management access. if not self.event.can_manage(session.user): urls = sorted(values_from_signal(signals.event_management.management_url.send(self.event), single_value=True)) response = redirect(urls[0]) if urls else None raise Forbidden(response=response) RHManageEventBase._check_access(self) # mainly to trigger the legacy "event locked" check
def _check_access(self): self.ALLOW_LOCKED = self.event.can_lock(session.user) RHManageEventBase._check_access(self)
def _check_access(self): RHManageEventBase._check_access(self) if not self.event.can_lock(session.user): raise Forbidden
def _check_access(self): RHManageEventBase._check_access(self) if (not self.target_category.can_create_events(session.user) and not self.target_category.can_propose_events(session.user)): raise Forbidden(_('You may not move events to this category.'))
def _check_access(self): self.ALLOW_LOCKED = self.event.can_lock(session.user) RHManageEventBase._check_access(self)
def _check_access(self): RHManageEventBase._check_access(self) if not self.event.can_lock(session.user): raise Forbidden