@@ -116,7 +116,6 @@ def get_permissions_for_active_roles_in_scope(
116116 permissions and scopes.
117117 """
118118 enforcer = AuthzEnforcer .get_enforcer ()
119- enforcer .load_policy ()
120119 filtered_policy = enforcer .get_filtered_grouping_policy (
121120 GroupingPolicyIndex .SCOPE .value , scope .namespaced_key
122121 )
@@ -149,7 +148,6 @@ def get_role_definitions_in_scope(scope: ScopeData) -> list[RoleData]:
149148 list[Role]: A list of roles.
150149 """
151150 enforcer = AuthzEnforcer .get_enforcer ()
152- enforcer .load_policy ()
153151 policy_filtered = enforcer .get_filtered_policy (
154152 PolicyIndex .SCOPE .value , scope .namespaced_key
155153 )
@@ -196,7 +194,6 @@ def get_all_roles_in_scope(scope: ScopeData) -> list[list[str]]:
196194 list[list[str]]: A list of policies in the specified scope.
197195 """
198196 enforcer = AuthzEnforcer .get_enforcer ()
199- enforcer .load_policy ()
200197 return enforcer .get_filtered_grouping_policy (
201198 GroupingPolicyIndex .SCOPE .value , scope .namespaced_key
202199 )
@@ -216,7 +213,6 @@ def assign_role_to_subject_in_scope(
216213 bool: True if the role was assigned successfully, False otherwise.
217214 """
218215 enforcer = AuthzEnforcer .get_enforcer ()
219- enforcer .load_policy ()
220216 return enforcer .add_role_for_user_in_domain (
221217 subject .namespaced_key ,
222218 role .namespaced_key ,
@@ -251,7 +247,6 @@ def unassign_role_from_subject_in_scope(
251247 bool: True if the role was unassigned successfully, False otherwise.
252248 """
253249 enforcer = AuthzEnforcer .get_enforcer ()
254- enforcer .load_policy ()
255250 return enforcer .delete_roles_for_user_in_domain (
256251 subject .namespaced_key , role .namespaced_key , scope .namespaced_key
257252 )
@@ -311,7 +306,6 @@ def get_subject_role_assignments_in_scope(
311306 list[RoleAssignmentData]: A list of role assignments for the subject in the scope.
312307 """
313308 enforcer = AuthzEnforcer .get_enforcer ()
314- enforcer .load_policy ()
315309 # TODO: we still need to get the remaining data for the role like email, etc
316310 role_assignments = []
317311 for namespaced_key in enforcer .get_roles_for_user_in_domain (
@@ -412,6 +406,5 @@ def get_subjects_for_role(role: RoleData) -> list[SubjectData]:
412406 list[SubjectData]: A list of subjects assigned to the specified role.
413407 """
414408 enforcer = AuthzEnforcer .get_enforcer ()
415- enforcer .load_policy ()
416409 policies = enforcer .get_filtered_grouping_policy (GroupingPolicyIndex .ROLE .value , role .namespaced_key )
417410 return [SubjectData (namespaced_key = policy [GroupingPolicyIndex .SUBJECT .value ]) for policy in policies ]
0 commit comments