* Block registering private ASN ranges * Add a continental region field for facilities #1007 * Incorrect order of search results #232 * Allow users to upload a small logo to their record #346 * Sponsor badge CSS and text translation issues #453 * IXP and Facility summary #18 * Add sales email and phone contact to ix object #949 * Increase timeout timer for IX-F JSON importer to 30s #962 * IX-F manually triggered import bugs #1054 * remove survey notifications * IX-F importer: manual add followed by IX-F prompted add can result in "The server rejected your data" #807 * performance fix for net view * api documentation generate broken #956 * fix poc set missing from net view * Auto focus cursor on search field on main website #695 * PeeringDB website has a poor choice of line-breaks for IPv6 addresses. #748 * Delete childless org objects #838 * linting * poetry lock * re-add mistakingly dropped translation to email template * fix template variables * regen docs * regen api docs * add u2f api * fix merge cruft * fido u2f webauthn first steps * dont need this * typo * first ux steps for security key management, u2f views * u2f auth * linting * Cascade delete when performed by superuser in django-admin #735 * security key passwordless login * reset webauthn migrations * security key 2fa * linting * ux cleanup * cleanup * Add IXP to AS record / dropdown limited #469 * ignore orgs that have pre-dated or finished sponsorships attached * split out to django_security_keys * default to 90 days * make URL required for new objects #374 * move CONN_MAX_AGE to proper location and expose as env var (#1060) * Error message for invalid password on email change * Registering a new facility or exchange organization is broken #1062 * Creating a facility that matches the name of a soft-deleted facility will cause the entry to bypass the verification queue #901 * irr source validator doesn't allow for hyphens in source #921 * split out javascript * split out js * Clicking "Add" to add a user api-key without providing a name for the key raises Internal Error #1033 * remove security key admin views * global stats don't show up at login screen #284 * Possible for "pending" exchange to have "deleted" ixlan (#1077) * webauthn finalizations * oidc support for oauth provider #1070 * Revert "Merge branch 'gh_1070' into 'support_202111'" * remove unused dev mounts * linting * add django-security-key and relock poetry * re-add imports removed through linting * docs regen * oauth toolkit pinned to 1.6.1 django-security-keys pinned to 1.0.1 * remove debug message * linting * linting Co-authored-by: Stefan Pratter <stefan@20c.com> Co-authored-by: David Poarch <dpoarch@20c.com>
1.6 KiB
Generated from org_admin_views.py on 2022-01-11 07:58:24.072700
peeringdb_server.org_admin_views
View for organization administrative actions (/org endpoint).
Functions
extract_permission_id
def extract_permission_id(source, dest, entity, org)
Extract a user's permissioning id for the specified entity from source and store it in dest .
Source should be a dict containing django-namespace-perms (namespace, level) items.
Dest should be a dict where permission ids are to be exracted to.
Entity can either be a HandleRef instance or class.
Org must be an Organization instance that owns the entity.
load_all_user_permissions
def load_all_user_permissions(org)
Return dict of all users with all their permissions for the given org.
load_entity_permissions
def load_entity_permissions(org, entity)
Return entity's permissions for the specified org.
org_admin_required
def org_admin_required(fnc)
Decorator function that ensures that the requesting user has administrative rights to the targeted organization.
Also sets "org" in kwargs.
permission_ids
def permission_ids(org)
Return a dict of a valid permissioning ids for the specified organization.
save_user_permissions
def save_user_permissions(org, user, perms)
Save user permissions for the specified org and user.
Perms should be a dict of permissioning ids and permission levels.
target_user_validate
def target_user_validate(fnc)
Decorator function that ensures that the targeted user is a member of the targeted organization.
Should be below org_admin_required.
Also sets "user" in kwargs.