def __pi_submitted_signatories(context): __make_owner_signatory(context) for signatory in context.signatories.values(): owner_login = utils.get_owner_login_pi(signatory) utils.assign_owner_role(signatory, owner_login) utils.assign_signatory_role(context, owner_login) utils.pi_update_signatories(context)
def _signatory_awaiting_consent(context): """Done when parent object is already in submitted_signatories stage. Otherwise roles assignment is handled by `__pi_assign_signatory_roles` """ if context.item.status == u"submitted_signatories": owner_login = utils.get_owner_login_pi(context) utils.assign_owner_role(context, owner_login) utils.assign_signatory_role(context.item, owner_login)
def signatory_deleted(ob, event): """Clear signatory role for a deleted signatory """ ob = removeSecurityProxy(ob) if ob.user: owner_login = get_owner_login_pi(ob) assign_signatory_role(ob.item, owner_login, unset=True) else: log.warning("Signatory object %s has no user set." " Skipping unsetting of role", ob.__str__() )
def user_is_context_owner(context): """Test if current user is the context owner e.g. to check if someone manipulating the context object is other than the owner of the object. A delegate is considered to be an owner of the object """ user = model_utils.get_db_user() owner_login = utils.get_owner_login_pi(context) if user.login == owner_login: return True delegations = delegation.get_user_delegations(user.user_id) users = [delegate.login for delegate in delegations] return owner_login in users
def user_is_context_owner(context): """Test if current user is the context owner e.g. to check if someone manipulating the context object is other than the owner of the object. A delegate is considered to be an owner of the object """ user = model_utils.get_db_user() owner_login = utils.get_owner_login_pi(context) session = Session() delegations = session.query(domain.User) \ .join((domain.UserDelegation, domain.User.user_id ==domain.UserDelegation.user_id)) \ .filter(domain.UserDelegation.delegation_id == user.user_id) \ .all() users = [delegate.login for delegate in delegations] users.append(owner_login) return user.login in users
def user_is_parent_document_owner(context): return (utils.get_owner_login_pi(context) == utils.get_owner_login_pi( context.head))
def user_is_parent_document_owner(context): return ( utils.get_owner_login_pi(context) == utils.get_owner_login_pi(context.item) )
def _signatory_rejected(context): owner_login = utils.get_owner_login_pi(context) utils.assign_signatory_role(context.item, owner_login, unset=True)