https://pulp.plan.io/https://pulp.plan.io/favicon.ico2021-12-07T19:04:03ZPulpPulp - Story #9613: As a developer, I can make permission object filtering chainablehttps://pulp.plan.io/issues/9613?journal_id=775822021-12-07T19:04:03Zbmbouterbmbouter@redhat.com
<ul><li><strong>Related to</strong> <i><a class="issue tracker-3 status-12 priority-6 priority-default closed" href="/issues/9614">Story #9614</a>: As a developer, I can mark a Model as RBAC enabled and have exceptions raised for any quersets that don't use `with_perm`</i> added</li></ul> Pulp - Story #9613: As a developer, I can make permission object filtering chainablehttps://pulp.plan.io/issues/9613?journal_id=775842021-12-07T19:06:08Zbmbouterbmbouter@redhat.com
<ul><li><strong>Related to</strong> deleted (<i><a class="issue tracker-3 status-12 priority-6 priority-default closed" href="/issues/9614">Story #9614</a>: As a developer, I can mark a Model as RBAC enabled and have exceptions raised for any quersets that don't use `with_perm`</i>)</li></ul> Pulp - Story #9613: As a developer, I can make permission object filtering chainablehttps://pulp.plan.io/issues/9613?journal_id=775862021-12-07T19:06:18Zbmbouterbmbouter@redhat.com
<ul><li><strong>Blocks</strong> <i><a class="issue tracker-3 status-12 priority-6 priority-default closed" href="/issues/9614">Story #9614</a>: As a developer, I can mark a Model as RBAC enabled and have exceptions raised for any quersets that don't use `with_perm`</i> added</li></ul> Pulp - Story #9613: As a developer, I can make permission object filtering chainablehttps://pulp.plan.io/issues/9613?journal_id=775882021-12-07T19:23:50Zgerrod
<ul></ul><p>I think it should be mentioned that <code>with_perms</code> will probably call <code>get_authenticated_user</code> implicitly for the permission check. In that case we should probably create our own custom version that can be ran in tasks outside of a django view. Or we would need to make a rule to do all queryset permission checks inside a view before handing off to a task.</p> Pulp - Story #9613: As a developer, I can make permission object filtering chainablehttps://pulp.plan.io/issues/9613?journal_id=776192021-12-08T07:54:58Zmdellweg
<ul></ul><p>If we want to allow both of these syntaxes, we should specify, whether one or all of the permissions are needed:
<code>qs.with_perm("core.task_delete", "core.task_view")</code>
<code>qs.with_perms(["core.task_delete", "core.task_view"])</code></p> Pulp - Story #9613: As a developer, I can make permission object filtering chainablehttps://pulp.plan.io/issues/9613?journal_id=785942022-01-17T16:44:57Zfao89
<ul><li><strong>Description</strong> updated (<a title="View differences" href="/journals/78594/diff?detail_id=79560">diff</a>)</li><li><strong>Status</strong> changed from <i>NEW</i> to <i>CLOSED - DUPLICATE</i></li></ul>