@@ -114,9 +114,7 @@ def get_permissions_for_active_roles_in_scope(
114114 permissions and scopes.
115115 """
116116 enforcer = AuthzEnforcer .get_enforcer ()
117- filtered_policy = enforcer .get_filtered_grouping_policy (
118- GroupingPolicyIndex .SCOPE .value , scope .namespaced_key
119- )
117+ filtered_policy = enforcer .get_filtered_grouping_policy (GroupingPolicyIndex .SCOPE .value , scope .namespaced_key )
120118
121119 if role :
122120 filtered_policy = [
@@ -141,9 +139,7 @@ def get_role_definitions_in_scope(scope: ScopeData) -> list[RoleData]:
141139 list[Role]: A list of roles.
142140 """
143141 enforcer = AuthzEnforcer .get_enforcer ()
144- policy_filtered = enforcer .get_filtered_policy (
145- PolicyIndex .SCOPE .value , scope .namespaced_key
146- )
142+ policy_filtered = enforcer .get_filtered_policy (PolicyIndex .SCOPE .value , scope .namespaced_key )
147143
148144 permissions_per_role = defaultdict (
149145 lambda : {
@@ -185,9 +181,7 @@ def get_all_roles_in_scope(scope: ScopeData) -> list[list[str]]:
185181 list[list[str]]: A list of policies in the specified scope.
186182 """
187183 enforcer = AuthzEnforcer .get_enforcer ()
188- return enforcer .get_filtered_grouping_policy (
189- GroupingPolicyIndex .SCOPE .value , scope .namespaced_key
190- )
184+ return enforcer .get_filtered_grouping_policy (GroupingPolicyIndex .SCOPE .value , scope .namespaced_key )
191185
192186
193187def assign_role_to_subject_in_scope (subject : SubjectData , role : RoleData , scope : ScopeData ) -> bool :
@@ -232,9 +226,7 @@ def unassign_role_from_subject_in_scope(subject: SubjectData, role: RoleData, sc
232226 bool: True if the role was unassigned successfully, False otherwise.
233227 """
234228 enforcer = AuthzEnforcer .get_enforcer ()
235- return enforcer .delete_roles_for_user_in_domain (
236- subject .namespaced_key , role .namespaced_key , scope .namespaced_key
237- )
229+ return enforcer .delete_roles_for_user_in_domain (subject .namespaced_key , role .namespaced_key , scope .namespaced_key )
238230
239231
240232def batch_unassign_role_from_subjects_in_scope (subjects : list [SubjectData ], role : RoleData , scope : ScopeData ) -> None :
0 commit comments