Mercurial > kallithea
changeset 7485:c6ce891312ef
auth: consistently use request.authuser - drop request.user
This seems like old tech debt. Now, just get rid of it.
author | Mads Kiilerich <mads@kiilerich.com> |
---|---|
date | Wed, 26 Dec 2018 02:21:26 +0100 |
parents | e4af9e2deb83 |
children | 088155584e2e |
files | kallithea/controllers/api/__init__.py kallithea/lib/auth.py kallithea/lib/base.py kallithea/tests/fixture.py |
diffstat | 4 files changed, 8 insertions(+), 8 deletions(-) [+] |
line wrap: on
line diff
--- a/kallithea/controllers/api/__init__.py Wed Dec 26 02:18:59 2018 +0100 +++ b/kallithea/controllers/api/__init__.py Wed Dec 26 02:21:26 2018 +0100 @@ -182,7 +182,7 @@ # this is little trick to inject logged in user for # perms decorators to work they expect the controller class to have # authuser attribute set - request.authuser = request.user = auth_u + request.authuser = auth_u # This attribute will need to be first param of a method that uses # api_key, which is translated to instance of user at that name
--- a/kallithea/lib/auth.py Wed Dec 26 02:18:59 2018 +0100 +++ b/kallithea/lib/auth.py Wed Dec 26 02:21:26 2018 +0100 @@ -944,11 +944,11 @@ class HasPermissionAny(_PermsFunction): def __call__(self, purpose=None): - global_permissions = request.user.permissions['global'] # usually very short + global_permissions = request.authuser.permissions['global'] # usually very short ok = any(p in global_permissions for p in self.required_perms) log.debug('Check %s for global %s (%s): %s' % - (request.user.username, self.required_perms, purpose, ok)) + (request.authuser.username, self.required_perms, purpose, ok)) return ok @@ -963,19 +963,19 @@ class HasRepoPermissionLevel(_PermFunction): def __call__(self, repo_name, purpose=None): - return request.user.has_repository_permission_level(repo_name, self.required_perm, purpose) + return request.authuser.has_repository_permission_level(repo_name, self.required_perm, purpose) class HasRepoGroupPermissionLevel(_PermFunction): def __call__(self, group_name, purpose=None): - return request.user.has_repository_group_permission_level(group_name, self.required_perm, purpose) + return request.authuser.has_repository_group_permission_level(group_name, self.required_perm, purpose) class HasUserGroupPermissionLevel(_PermFunction): def __call__(self, user_group_name, purpose=None): - return request.user.has_user_group_permission_level(user_group_name, self.required_perm, purpose) + return request.authuser.has_user_group_permission_level(user_group_name, self.required_perm, purpose) #==============================================================================
--- a/kallithea/lib/base.py Wed Dec 26 02:18:59 2018 +0100 +++ b/kallithea/lib/base.py Wed Dec 26 02:21:26 2018 +0100 @@ -529,7 +529,7 @@ if type.lower() == 'bearer': bearer_token = params - request.authuser = request.user = self._determine_auth_user( + request.authuser = self._determine_auth_user( request.GET.get('api_key'), bearer_token, session.get('authuser'),
--- a/kallithea/tests/fixture.py Wed Dec 26 02:18:59 2018 +0100 +++ b/kallithea/tests/fixture.py Wed Dec 26 02:21:26 2018 +0100 @@ -333,7 +333,7 @@ org_repo = other_repo = Repository.get_by_repo_name(repo_name) owner_user = User.get_by_username(TEST_USER_ADMIN_LOGIN) reviewers = [User.get_by_username(TEST_USER_REGULAR_LOGIN)] - request.authuser = request.user = AuthUser(dbuser=owner_user) + request.authuser = AuthUser(dbuser=owner_user) # creating a PR sends a message with an absolute URL - without routing that requires mocking with mock.patch.object(helpers, 'url', (lambda arg, qualified=False, **kwargs: ('https://localhost' if qualified else '') + '/fake/' + arg)): cmd = CreatePullRequestAction(org_repo, other_repo, org_ref, other_ref, title, u'No description', owner_user, reviewers)