@@ -78,9 +78,7 @@ def get_permissions_for_roles(
7878 permissions_by_role = {}
7979
8080 for role in roles :
81- permissions_by_role [role .external_key ] = {
82- "permissions" : get_permissions_for_single_role (role )
83- }
81+ permissions_by_role [role .external_key ] = {"permissions" : get_permissions_for_single_role (role )}
8482
8583 return permissions_by_role
8684
@@ -117,22 +115,15 @@ def get_permissions_for_active_roles_in_scope(
117115 """
118116 enforcer = AuthzEnforcer .get_enforcer ()
119117 enforcer .load_policy ()
120- filtered_policy = enforcer .get_filtered_grouping_policy (
121- GroupingPolicyIndex .SCOPE .value , scope .namespaced_key
122- )
118+ filtered_policy = enforcer .get_filtered_grouping_policy (GroupingPolicyIndex .SCOPE .value , scope .namespaced_key )
123119
124120 if role :
125121 filtered_policy = [
126- policy
127- for policy in filtered_policy
128- if policy [GroupingPolicyIndex .ROLE .value ] == role .namespaced_key
122+ policy for policy in filtered_policy if policy [GroupingPolicyIndex .ROLE .value ] == role .namespaced_key
129123 ]
130124
131125 return get_permissions_for_roles (
132- [
133- RoleData (namespaced_key = policy [GroupingPolicyIndex .ROLE .value ])
134- for policy in filtered_policy
135- ]
126+ [RoleData (namespaced_key = policy [GroupingPolicyIndex .ROLE .value ]) for policy in filtered_policy ]
136127 )
137128
138129
@@ -150,9 +141,7 @@ def get_role_definitions_in_scope(scope: ScopeData) -> list[RoleData]:
150141 """
151142 enforcer = AuthzEnforcer .get_enforcer ()
152143 enforcer .load_policy ()
153- policy_filtered = enforcer .get_filtered_policy (
154- PolicyIndex .SCOPE .value , scope .namespaced_key
155- )
144+ policy_filtered = enforcer .get_filtered_policy (PolicyIndex .SCOPE .value , scope .namespaced_key )
156145
157146 permissions_per_role = defaultdict (
158147 lambda : {
@@ -164,9 +153,7 @@ def get_role_definitions_in_scope(scope: ScopeData) -> list[RoleData]:
164153 permissions_per_role [policy [PolicyIndex .ROLE .value ]]["scopes" ].append (
165154 ScopeData (namespaced_key = policy [PolicyIndex .SCOPE .value ])
166155 ) # TODO: I don't think this actually gets used anywhere
167- permissions_per_role [policy [PolicyIndex .ROLE .value ]]["permissions" ].append (
168- get_permission_from_policy (policy )
169- )
156+ permissions_per_role [policy [PolicyIndex .ROLE .value ]]["permissions" ].append (get_permission_from_policy (policy ))
170157
171158 return [
172159 RoleData (
@@ -197,14 +184,10 @@ def get_all_roles_in_scope(scope: ScopeData) -> list[list[str]]:
197184 """
198185 enforcer = AuthzEnforcer .get_enforcer ()
199186 enforcer .load_policy ()
200- return enforcer .get_filtered_grouping_policy (
201- GroupingPolicyIndex .SCOPE .value , scope .namespaced_key
202- )
187+ return enforcer .get_filtered_grouping_policy (GroupingPolicyIndex .SCOPE .value , scope .namespaced_key )
203188
204189
205- def assign_role_to_subject_in_scope (
206- subject : SubjectData , role : RoleData , scope : ScopeData
207- ) -> bool :
190+ def assign_role_to_subject_in_scope (subject : SubjectData , role : RoleData , scope : ScopeData ) -> bool :
208191 """Assign a role to a subject.
209192
210193 Args:
@@ -224,9 +207,7 @@ def assign_role_to_subject_in_scope(
224207 )
225208
226209
227- def batch_assign_role_to_subjects_in_scope (
228- subjects : list [SubjectData ], role : RoleData , scope : ScopeData
229- ) -> None :
210+ def batch_assign_role_to_subjects_in_scope (subjects : list [SubjectData ], role : RoleData , scope : ScopeData ) -> None :
230211 """Assign a role to a list of subjects.
231212
232213 Args:
@@ -237,9 +218,7 @@ def batch_assign_role_to_subjects_in_scope(
237218 assign_role_to_subject_in_scope (subject , role , scope )
238219
239220
240- def unassign_role_from_subject_in_scope (
241- subject : SubjectData , role : RoleData , scope : ScopeData
242- ) -> bool :
221+ def unassign_role_from_subject_in_scope (subject : SubjectData , role : RoleData , scope : ScopeData ) -> bool :
243222 """Unassign a role from a subject.
244223
245224 Args:
@@ -252,14 +231,10 @@ def unassign_role_from_subject_in_scope(
252231 """
253232 enforcer = AuthzEnforcer .get_enforcer ()
254233 enforcer .load_policy ()
255- return enforcer .delete_roles_for_user_in_domain (
256- subject .namespaced_key , role .namespaced_key , scope .namespaced_key
257- )
234+ return enforcer .delete_roles_for_user_in_domain (subject .namespaced_key , role .namespaced_key , scope .namespaced_key )
258235
259236
260- def batch_unassign_role_from_subjects_in_scope (
261- subjects : list [SubjectData ], role : RoleData , scope : ScopeData
262- ) -> None :
237+ def batch_unassign_role_from_subjects_in_scope (subjects : list [SubjectData ], role : RoleData , scope : ScopeData ) -> None :
263238 """Unassign a role from a list of subjects.
264239
265240 Args:
@@ -282,9 +257,7 @@ def get_subject_role_assignments(subject: SubjectData) -> list[RoleAssignmentDat
282257 """
283258 enforcer = AuthzEnforcer .get_enforcer ()
284259 role_assignments = []
285- for policy in enforcer .get_filtered_grouping_policy (
286- GroupingPolicyIndex .SUBJECT .value , subject .namespaced_key
287- ):
260+ for policy in enforcer .get_filtered_grouping_policy (GroupingPolicyIndex .SUBJECT .value , subject .namespaced_key ):
288261 role = RoleData (namespaced_key = policy [GroupingPolicyIndex .ROLE .value ])
289262 role .permissions = get_permissions_for_single_role (role )
290263
@@ -298,9 +271,7 @@ def get_subject_role_assignments(subject: SubjectData) -> list[RoleAssignmentDat
298271 return role_assignments
299272
300273
301- def get_subject_role_assignments_in_scope (
302- subject : SubjectData , scope : ScopeData
303- ) -> list [RoleAssignmentData ]:
274+ def get_subject_role_assignments_in_scope (subject : SubjectData , scope : ScopeData ) -> list [RoleAssignmentData ]:
304275 """Get the roles for a subject in a specific scope.
305276
306277 Args:
@@ -314,9 +285,7 @@ def get_subject_role_assignments_in_scope(
314285 enforcer .load_policy ()
315286 # TODO: we still need to get the remaining data for the role like email, etc
316287 role_assignments = []
317- for namespaced_key in enforcer .get_roles_for_user_in_domain (
318- subject .namespaced_key , scope .namespaced_key
319- ):
288+ for namespaced_key in enforcer .get_roles_for_user_in_domain (subject .namespaced_key , scope .namespaced_key ):
320289 role = RoleData (namespaced_key = namespaced_key )
321290 role_assignments .append (
322291 RoleAssignmentData (
@@ -333,9 +302,7 @@ def get_subject_role_assignments_in_scope(
333302 return role_assignments
334303
335304
336- def get_subject_role_assignments_for_role_in_scope (
337- role : RoleData , scope : ScopeData
338- ) -> list [RoleAssignmentData ]:
305+ def get_subject_role_assignments_for_role_in_scope (role : RoleData , scope : ScopeData ) -> list [RoleAssignmentData ]:
339306 """Get the subjects assigned to a specific role in a specific scope.
340307
341308 Args:
@@ -347,9 +314,7 @@ def get_subject_role_assignments_for_role_in_scope(
347314 """
348315 enforcer = AuthzEnforcer .get_enforcer ()
349316 role_assignments = []
350- for subject in enforcer .get_users_for_role_in_domain (
351- role .namespaced_key , scope .namespaced_key
352- ):
317+ for subject in enforcer .get_users_for_role_in_domain (role .namespaced_key , scope .namespaced_key ):
353318 if subject .startswith (f"{ RoleData .NAMESPACE } { RoleData .SEPARATOR } " ):
354319 # Skip roles that are also subjects
355320 continue
@@ -413,10 +378,5 @@ def get_subjects_for_role(role: RoleData) -> list[SubjectData]:
413378 """
414379 enforcer = AuthzEnforcer .get_enforcer ()
415380 enforcer .load_policy ()
416- policies = enforcer .get_filtered_grouping_policy (
417- GroupingPolicyIndex .ROLE .value , role .namespaced_key
418- )
419- return [
420- SubjectData (namespaced_key = policy [GroupingPolicyIndex .SUBJECT .value ])
421- for policy in policies
422- ]
381+ policies = enforcer .get_filtered_grouping_policy (GroupingPolicyIndex .ROLE .value , role .namespaced_key )
382+ return [SubjectData (namespaced_key = policy [GroupingPolicyIndex .SUBJECT .value ]) for policy in policies ]
0 commit comments