65 lines
2.1 KiB
Python
65 lines
2.1 KiB
Python
from ckan.plugins import toolkit as pt
|
|
from ckanext.harvest.logic.auth import user_is_sysadmin
|
|
|
|
|
|
def harvest_source_create(context, data_dict):
|
|
'''
|
|
Authorization check for harvest source creation
|
|
|
|
It forwards the checks to package_create, which will check for
|
|
organization membership, whether if sysadmin, etc according to the
|
|
instance configuration.
|
|
'''
|
|
user = context.get('user')
|
|
try:
|
|
pt.check_access('package_create', context, data_dict)
|
|
return {'success': True}
|
|
except pt.NotAuthorized:
|
|
return {'success': False,
|
|
'msg': pt._('User {0} not authorized to create harvest sources').format(user)}
|
|
|
|
|
|
def harvest_job_create(context, data_dict):
|
|
'''
|
|
Authorization check for harvest job creation
|
|
|
|
It forwards the checks to package_update, ie the user can only create
|
|
new jobs if she is allowed to edit the harvest source dataset.
|
|
'''
|
|
model = context['model']
|
|
source_id = data_dict['source_id']
|
|
|
|
pkg = model.Package.get(source_id)
|
|
if not pkg:
|
|
raise pt.ObjectNotFound(pt._('Harvest source not found'))
|
|
|
|
context['package'] = pkg
|
|
try:
|
|
pt.check_access('package_update', context, data_dict)
|
|
return {'success': True}
|
|
except pt.NotAuthorized:
|
|
return {'success': False,
|
|
'msg': pt._('User not authorized to create a job for source {0}').format(source_id)}
|
|
|
|
|
|
def harvest_job_create_all(context, data_dict):
|
|
'''
|
|
Authorization check for creating new jobs for all sources
|
|
|
|
Only sysadmins can do it
|
|
'''
|
|
if not user_is_sysadmin(context):
|
|
return {'success': False, 'msg': pt._('Only sysadmins can create harvest jobs for all sources')}
|
|
else:
|
|
return {'success': True}
|
|
|
|
def harvest_object_create(context, data_dict):
|
|
"""
|
|
Auth check for creating a harvest object
|
|
|
|
only the sysadmins can create harvest objects
|
|
"""
|
|
# sysadmins can run all actions if we've got to this point we're not a sysadmin
|
|
return {'success': False, 'msg': pt._('Only the sysadmins can create harvest objects')}
|
|
|