1
0
mirror of https://github.com/peeringdb/peeringdb.git synced 2024-05-11 05:55:09 +00:00
Files
peeringdb-peeringdb/docs/dev/modules/api_key_views.py.md
Matt Griswold 8ef76dc5ab Support 202110 (#1085)
* Block registering private ASN ranges

* Add a continental region field for facilities #1007

* Incorrect order of search results #232

* Allow users to upload a small logo to their record #346

* Sponsor badge CSS and text translation issues #453

* IXP and Facility summary #18

* Add sales email and phone contact to ix object #949

* Increase timeout timer for IX-F JSON importer to 30s #962

* IX-F manually triggered import bugs #1054

* remove survey notifications

* IX-F importer: manual add followed by IX-F prompted add can result in "The server rejected your data" #807

* performance fix for net view

* api documentation generate broken #956

* fix poc set missing from net view

* Auto focus cursor on search field on main website #695

* PeeringDB website has a poor choice of line-breaks for IPv6 addresses. #748

* Delete childless org objects #838

* linting

* poetry lock

* re-add mistakingly dropped translation to email template

* fix template variables

* regen docs

* regen api docs

* fix merge cruft

* django-peeringdb to 2.11 and poetry relock

* linting

* comment out django-peeringdb volume mount

* add missing declaration

Co-authored-by: Stefan Pratter <stefan@20c.com>
Co-authored-by: David Poarch <dpoarch@20c.com>
2021-11-09 09:47:38 -06:00

38 lines
708 B
Markdown

Generated from api_key_views.py on 2021-11-02 10:01:21.611533
# peeringdb_server.api_key_views
Views for organization api key management.
# Functions
---
## add_user_key
`def add_user_key(request, **kwargs)`
Create a new User API key.
Requires a name and a readonly boolean.
---
## load_all_key_permissions
`def load_all_key_permissions(org)`
Returns dict of all users with all their permissions for
the given org.
---
## remove_user_key
`def remove_user_key(request, **kwargs)`
Revoke user api key.
---
## save_key_permissions
`def save_key_permissions(org, key, perms)`
Save key permissions for the specified org and key.
Perms should be a dict of permissioning ids and permission levels.
---