Skip to content

Commit fb74c35

Browse files
committed
squash!: Cleanup
1 parent 2717d61 commit fb74c35

3 files changed

Lines changed: 4 additions & 7 deletions

File tree

openedx_authz/api/roles.py

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -218,7 +218,7 @@ def assign_role_to_subject_in_scope(subject: SubjectData, role: RoleData, scope:
218218
)
219219
if not extended_rule:
220220
raise Exception("Failed to create ExtendedCasbinRule for the assignment")
221-
221+
222222
# Invalidate policy cache to ensure changes are picked up
223223
AuthzEnforcer.invalidate_policy_cache()
224224
return True
@@ -247,7 +247,9 @@ def unassign_role_from_subject_in_scope(subject: SubjectData, role: RoleData, sc
247247
bool: True if the role was unassigned successfully, False otherwise.
248248
"""
249249
enforcer = AuthzEnforcer.get_enforcer()
250-
success = enforcer.delete_roles_for_user_in_domain(subject.namespaced_key, role.namespaced_key, scope.namespaced_key)
250+
success = enforcer.delete_roles_for_user_in_domain(
251+
subject.namespaced_key, role.namespaced_key, scope.namespaced_key
252+
)
251253
# Invalidate policy cache to ensure changes are picked up
252254
AuthzEnforcer.invalidate_policy_cache()
253255
return success

openedx_authz/rest_api/v1/permissions.py

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,6 @@
55
from rest_framework.permissions import BasePermission
66

77
from openedx_authz import api
8-
from openedx_authz.engine.enforcer import AuthzEnforcer
98

109

1110
class PermissionMeta(type(BasePermission)):
@@ -183,7 +182,6 @@ def has_permission(self, request, view) -> bool:
183182
"""
184183
if request.user.is_superuser or request.user.is_staff:
185184
return True
186-
# AuthzEnforcer.get_enforcer().load_policy()
187185
return self._get_permission_instance(request).has_permission(request, view)
188186

189187
def has_object_permission(self, request, view, obj) -> bool:
@@ -200,7 +198,6 @@ def has_object_permission(self, request, view, obj) -> bool:
200198
"""
201199
if request.user.is_superuser or request.user.is_staff:
202200
return True
203-
# AuthzEnforcer.get_enforcer().load_policy()
204201
return self._get_permission_instance(request).has_object_permission(request, view, obj)
205202

206203

openedx_authz/rest_api/v1/views.py

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,6 @@
1616

1717
from openedx_authz import api
1818
from openedx_authz.constants import permissions
19-
from openedx_authz.engine.enforcer import AuthzEnforcer
2019
from openedx_authz.rest_api.data import RoleOperationError, RoleOperationStatus
2120
from openedx_authz.rest_api.decorators import authz_permissions, view_auth_classes
2221
from openedx_authz.rest_api.utils import (
@@ -103,7 +102,6 @@ class PermissionValidationMeView(APIView):
103102
)
104103
def post(self, request: HttpRequest) -> Response:
105104
"""Validate one or more permissions for the authenticated user."""
106-
# AuthzEnforcer.get_enforcer().load_policy()
107105

108106
serializer = PermissionValidationSerializer(data=request.data, many=True)
109107
serializer.is_valid(raise_exception=True)

0 commit comments

Comments
 (0)