diff options
| author | Georgios Andreadis <info@gandreadis.com> | 2020-07-08 14:35:47 +0200 |
|---|---|---|
| committer | Fabian Mastenbroek <mail.fabianm@gmail.com> | 2020-08-24 19:47:57 +0200 |
| commit | e2e9cec1d4836a4cba81874129b8da8a12c216f6 (patch) | |
| tree | a4f73a93174daad0482ab4b94849bbce94a3491e /web-server/opendc/models | |
| parent | 9761bdd1f2b0f72a2c0fa46b3dee1920a580a26a (diff) | |
Implement scenario adding endpoint
Diffstat (limited to 'web-server/opendc/models')
| -rw-r--r-- | web-server/opendc/models/scenario.py | 26 |
1 files changed, 26 insertions, 0 deletions
diff --git a/web-server/opendc/models/scenario.py b/web-server/opendc/models/scenario.py new file mode 100644 index 00000000..d7d959ca --- /dev/null +++ b/web-server/opendc/models/scenario.py @@ -0,0 +1,26 @@ +from opendc.models.model import Model +from opendc.models.portfolio import Portfolio +from opendc.models.user import User +from opendc.util.exceptions import ClientError +from opendc.util.rest import Response + + +class Scenario(Model): + """Model representing a Scenario.""" + + collection_name = 'scenarios' + + def check_user_access(self, google_id, edit_access): + """Raises an error if the user with given [google_id] has insufficient access. + + Checks access on the parent project. + + :param google_id: The Google ID of the user. + :param edit_access: True when edit access should be checked, otherwise view access. + """ + portfolio = Portfolio.from_id(self.obj['portfolioId']) + user = User.from_google_id(google_id) + authorizations = list( + filter(lambda x: str(x['projectId']) == str(portfolio.get_id()), user.obj['authorizations'])) + if len(authorizations) == 0 or (edit_access and authorizations[0]['authorizationLevel'] == 'VIEW'): + raise ClientError(Response(403, 'Forbidden from retrieving/editing scenario.')) |
