def check_access(session, actor, target): return (actor.name == target.name or user_is_user_admin(session, actor) or (target.role_user and can_manage_role_user(session, actor, tuser=target)) or (target.is_service_account and can_manage_service_account(session, target, actor)))
def check_access(session, actor, target): # type: (Session, User, User) -> bool return (actor.name == target.name or (target.role_user and can_manage_role_user(session, actor, tuser=target)) or (target.is_service_account and can_manage_service_account(session, target, actor)))
def check_access(session, actor, target): # type: (Session, User, User) -> bool return ( actor.name == target.name or (target.role_user and can_manage_role_user(session, actor, tuser=target)) or (target.is_service_account and can_manage_service_account(session, target, actor)) )
def check_access(session, actor, target): return ( actor.name == target.name or user_is_user_admin(session, actor) or (target.role_user and can_manage_role_user(session, actor, tuser=target)) or (target.is_service_account and can_manage_service_account(session, target, actor)) )
def get_role_user_view_template_vars(session, actor, user, group, graph): ret = get_user_view_template_vars(session, actor, user, graph) ret.update(get_group_view_template_vars(session, actor, group, graph)) ret["can_control"] = can_manage_role_user(session, user=actor, tuser=user) ret["log_entries"] = sorted(set(get_log_entries_by_user(session, user) + group.my_log_entries()), key=lambda x: x.log_time, reverse=True) return ret
def get_role_user_view_template_vars(session, actor, user, group, graph): ret = get_user_view_template_vars(session, actor, user, graph) ret.update(get_group_view_template_vars(session, actor, group, graph)) ret["can_control"] = can_manage_role_user(session, user=actor, tuser=user) ret["log_entries"] = sorted( set(get_log_entries_by_user(session, user) + group.my_log_entries()), key=lambda x: x.log_time, reverse=True) return ret