File tree Expand file tree Collapse file tree
Expand file tree Collapse file tree Original file line number Diff line number Diff line change @@ -37,8 +37,9 @@ def get_all_roles():
3737 def get_roles_in_scope(scope: ScopeData):
3838 return enforcer.get_filtered_roles(scope.namespaced_key)
3939 """
40+
4041 FILTER_DATA_CLASSES = { # Consider empty for no filtering
41- "scope" : ScopeData ,
42+ # "scope": ScopeData,
4243 # TODO: currently ALLOW_FILTERED_POLICY_LOADING is False to avoid partial policy loads. We can
4344 # Allow filtering on scope (initially) once we have a CONF model that supports this so filtering is meaningful,
4445 # consistent and doesn't lead to partial policy loads.
Original file line number Diff line number Diff line change @@ -176,6 +176,7 @@ def get_role_definitions_in_scope(scope: ScopeData) -> list[RoleData]:
176176 for role , permissions in permissions_per_role .items ()
177177 ]
178178
179+
179180@manage_policy_lifecycle ()
180181def get_all_roles_names () -> list [str ]:
181182 """Get all the available roles names in the current environment.
You can’t perform that action at this time.
0 commit comments