@@ -78,9 +78,7 @@ def get_permissions_for_roles(
7878 permissions_by_role = {}
7979
8080 for role in roles :
81- permissions_by_role [role .external_key ] = {
82- "permissions" : get_permissions_for_single_role (role )
83- }
81+ permissions_by_role [role .external_key ] = {"permissions" : get_permissions_for_single_role (role )}
8482
8583 return permissions_by_role
8684
@@ -116,22 +114,15 @@ def get_permissions_for_active_roles_in_scope(
116114 permissions and scopes.
117115 """
118116 enforcer = AuthzEnforcer .get_enforcer ()
119- filtered_policy = enforcer .get_filtered_grouping_policy (
120- GroupingPolicyIndex .SCOPE .value , scope .namespaced_key
121- )
117+ filtered_policy = enforcer .get_filtered_grouping_policy (GroupingPolicyIndex .SCOPE .value , scope .namespaced_key )
122118
123119 if role :
124120 filtered_policy = [
125- policy
126- for policy in filtered_policy
127- if policy [GroupingPolicyIndex .ROLE .value ] == role .namespaced_key
121+ policy for policy in filtered_policy if policy [GroupingPolicyIndex .ROLE .value ] == role .namespaced_key
128122 ]
129123
130124 return get_permissions_for_roles (
131- [
132- RoleData (namespaced_key = policy [GroupingPolicyIndex .ROLE .value ])
133- for policy in filtered_policy
134- ]
125+ [RoleData (namespaced_key = policy [GroupingPolicyIndex .ROLE .value ]) for policy in filtered_policy ]
135126 )
136127
137128
@@ -148,9 +139,7 @@ def get_role_definitions_in_scope(scope: ScopeData) -> list[RoleData]:
148139 list[Role]: A list of roles.
149140 """
150141 enforcer = AuthzEnforcer .get_enforcer ()
151- policy_filtered = enforcer .get_filtered_policy (
152- PolicyIndex .SCOPE .value , scope .namespaced_key
153- )
142+ policy_filtered = enforcer .get_filtered_policy (PolicyIndex .SCOPE .value , scope .namespaced_key )
154143
155144 permissions_per_role = defaultdict (
156145 lambda : {
@@ -162,9 +151,7 @@ def get_role_definitions_in_scope(scope: ScopeData) -> list[RoleData]:
162151 permissions_per_role [policy [PolicyIndex .ROLE .value ]]["scopes" ].append (
163152 ScopeData (namespaced_key = policy [PolicyIndex .SCOPE .value ])
164153 ) # TODO: I don't think this actually gets used anywhere
165- permissions_per_role [policy [PolicyIndex .ROLE .value ]]["permissions" ].append (
166- get_permission_from_policy (policy )
167- )
154+ permissions_per_role [policy [PolicyIndex .ROLE .value ]]["permissions" ].append (get_permission_from_policy (policy ))
168155
169156 return [
170157 RoleData (
@@ -194,14 +181,10 @@ def get_all_roles_in_scope(scope: ScopeData) -> list[list[str]]:
194181 list[list[str]]: A list of policies in the specified scope.
195182 """
196183 enforcer = AuthzEnforcer .get_enforcer ()
197- return enforcer .get_filtered_grouping_policy (
198- GroupingPolicyIndex .SCOPE .value , scope .namespaced_key
199- )
184+ return enforcer .get_filtered_grouping_policy (GroupingPolicyIndex .SCOPE .value , scope .namespaced_key )
200185
201186
202- def assign_role_to_subject_in_scope (
203- subject : SubjectData , role : RoleData , scope : ScopeData
204- ) -> bool :
187+ def assign_role_to_subject_in_scope (subject : SubjectData , role : RoleData , scope : ScopeData ) -> bool :
205188 """Assign a role to a subject.
206189
207190 Args:
@@ -220,9 +203,7 @@ def assign_role_to_subject_in_scope(
220203 )
221204
222205
223- def batch_assign_role_to_subjects_in_scope (
224- subjects : list [SubjectData ], role : RoleData , scope : ScopeData
225- ) -> None :
206+ def batch_assign_role_to_subjects_in_scope (subjects : list [SubjectData ], role : RoleData , scope : ScopeData ) -> None :
226207 """Assign a role to a list of subjects.
227208
228209 Args:
@@ -233,9 +214,7 @@ def batch_assign_role_to_subjects_in_scope(
233214 assign_role_to_subject_in_scope (subject , role , scope )
234215
235216
236- def unassign_role_from_subject_in_scope (
237- subject : SubjectData , role : RoleData , scope : ScopeData
238- ) -> bool :
217+ def unassign_role_from_subject_in_scope (subject : SubjectData , role : RoleData , scope : ScopeData ) -> bool :
239218 """Unassign a role from a subject.
240219
241220 Args:
@@ -247,14 +226,10 @@ def unassign_role_from_subject_in_scope(
247226 bool: True if the role was unassigned successfully, False otherwise.
248227 """
249228 enforcer = AuthzEnforcer .get_enforcer ()
250- return enforcer .delete_roles_for_user_in_domain (
251- subject .namespaced_key , role .namespaced_key , scope .namespaced_key
252- )
229+ return enforcer .delete_roles_for_user_in_domain (subject .namespaced_key , role .namespaced_key , scope .namespaced_key )
253230
254231
255- def batch_unassign_role_from_subjects_in_scope (
256- subjects : list [SubjectData ], role : RoleData , scope : ScopeData
257- ) -> None :
232+ def batch_unassign_role_from_subjects_in_scope (subjects : list [SubjectData ], role : RoleData , scope : ScopeData ) -> None :
258233 """Unassign a role from a list of subjects.
259234
260235 Args:
@@ -277,9 +252,7 @@ def get_subject_role_assignments(subject: SubjectData) -> list[RoleAssignmentDat
277252 """
278253 enforcer = AuthzEnforcer .get_enforcer ()
279254 role_assignments = []
280- for policy in enforcer .get_filtered_grouping_policy (
281- GroupingPolicyIndex .SUBJECT .value , subject .namespaced_key
282- ):
255+ for policy in enforcer .get_filtered_grouping_policy (GroupingPolicyIndex .SUBJECT .value , subject .namespaced_key ):
283256 role = RoleData (namespaced_key = policy [GroupingPolicyIndex .ROLE .value ])
284257 role .permissions = get_permissions_for_single_role (role )
285258
@@ -293,9 +266,7 @@ def get_subject_role_assignments(subject: SubjectData) -> list[RoleAssignmentDat
293266 return role_assignments
294267
295268
296- def get_subject_role_assignments_in_scope (
297- subject : SubjectData , scope : ScopeData
298- ) -> list [RoleAssignmentData ]:
269+ def get_subject_role_assignments_in_scope (subject : SubjectData , scope : ScopeData ) -> list [RoleAssignmentData ]:
299270 """Get the roles for a subject in a specific scope.
300271
301272 Args:
@@ -308,9 +279,7 @@ def get_subject_role_assignments_in_scope(
308279 enforcer = AuthzEnforcer .get_enforcer ()
309280 # TODO: we still need to get the remaining data for the role like email, etc
310281 role_assignments = []
311- for namespaced_key in enforcer .get_roles_for_user_in_domain (
312- subject .namespaced_key , scope .namespaced_key
313- ):
282+ for namespaced_key in enforcer .get_roles_for_user_in_domain (subject .namespaced_key , scope .namespaced_key ):
314283 role = RoleData (namespaced_key = namespaced_key )
315284 role_assignments .append (
316285 RoleAssignmentData (
@@ -327,9 +296,7 @@ def get_subject_role_assignments_in_scope(
327296 return role_assignments
328297
329298
330- def get_subject_role_assignments_for_role_in_scope (
331- role : RoleData , scope : ScopeData
332- ) -> list [RoleAssignmentData ]:
299+ def get_subject_role_assignments_for_role_in_scope (role : RoleData , scope : ScopeData ) -> list [RoleAssignmentData ]:
333300 """Get the subjects assigned to a specific role in a specific scope.
334301
335302 Args:
@@ -341,9 +308,7 @@ def get_subject_role_assignments_for_role_in_scope(
341308 """
342309 enforcer = AuthzEnforcer .get_enforcer ()
343310 role_assignments = []
344- for subject in enforcer .get_users_for_role_in_domain (
345- role .namespaced_key , scope .namespaced_key
346- ):
311+ for subject in enforcer .get_users_for_role_in_domain (role .namespaced_key , scope .namespaced_key ):
347312 if subject .startswith (f"{ RoleData .NAMESPACE } { RoleData .SEPARATOR } " ):
348313 # Skip roles that are also subjects
349314 continue
0 commit comments